Last modification by Nathan- 54 there is
spy car

Digital DawnModern cars enslave their owners

Digital Dawn - Apr 23, 2024

Dystopian technocratic takeover. The automobile, which was once a tool of personal freedom, has become a tool of control under the “big brother” technologies of smart grids.

   

Modern cars produced since the mid-2010s are equipped with “Trojan horse” technologies that owners are starting to become aware of. These technologies can control where and when drivers are allowed to drive, track drivers' eyes, record occupant conversations, collect genetic and health information, biometric data and weight of drivers and passengers, lead to increased car insurance premiums and even monitor drivers' sexual activity.

In a recent video, British automotive journalist Geoff Buys Cars explains how a Hyundai Kona that has undergone a software update is now subject to geofencing and geotiming, in other words, the car can now have distance and time limits set remotely by the manufacturer. The software update's terms of use specify that these driving restrictions will only be activated if required by law.

“That means you won't be able to drive your car beyond the limits decided by the government, so all these conspiracies about 15 minute cities, climate zones and lockdowns, how are they going to implement them? Well, probably with the geofencing capabilities that are built into these cars, using the infrastructure that they're already putting on the roads with all the cameras and all the sensors and all the new technology that's coming into place," he said. Geoff said.

Hyundai refused to roll back the update, making the controls a permanent "feature." The automotive journalist clarified that all modern cars have the capability to do this, so even if a car's software does not currently allow restricting driving distance, trip location, permitted travel times and even autonomous driving, this control may be added at a later date.

“Some everyday cars are already fully autonomous, the technology is already in cars, they just haven't been turned on yet,” Geoff said.

The automotive journalist goes on to explain how this technology can be used to stop people from driving their cars on Sunday, possibly to stop them from going to church, under the guise of "saving the planet" in the future. climate blockade, before ending the video by pointing the camera at a trail of atmospheric aerosol (chemtrail) and ironically saying "it's pretty good, isn't it".

This new monitoring and control technology is also used by automobile insurers. WSB-TV recently reported on an American woman who saw her insurance premium increase by 80% after her current-generation Chevrolet Camero began downloading hundreds of pages of information about her driving habits to Chevrolet , who then sold them to data brokers, who then bought them from large insurance companies.

read the article

Last modification by Nathan- 54 there is
Windows 11 a potential spy

Revolution 2030: Other sourceA researcher's scandalous find on Windows 11

Revolution 2030: Other source - March 24, 2024

Windows 11 spies on everything you do without asking your consent.

   

For those who use the keyboard a little, this video will be instructive. The goal is to stop the hemorrhage of data leaks to third-party and GAFAM sites.

Last modification by Nathan- 54 there is
SpaceX spying

Digital DawnMusk builds vast network of spy satellites

Digital Dawn - March 20, 2024

SpaceX reportedly signed a $1,8 billion contract with US intelligence services in 2021.

   

Elon Musk's secret Starshield project will allow the US military to track targets and support US and allied ground forces in real time almost anywhere in the world, Reuters reported, sharing new details about the billionaire's dealings with the Pentagon.

SpaceX has launched military satellite prototypes alongside "civilian" payloads on Falcon 9 rockets since at least 2020, before landing a lucrative $1,8 billion contract with the National Reconnaissance Office (NRO) in 2021. Reuters wrote on Saturday, citing five anonymous sources familiar with the project.

The vast constellation of low-orbit satellites will be capable of tracking ground targets in real time almost anywhere in the world, the sources said. One boasted that Starshield would ensure “no one can hide” from the US government. Starshield also reportedly aims to be “more resistant to attacks” from rival space powers.

It remains unclear how many Starshield satellites are currently operational or when the system is expected to be fully operational, with SpaceX and the Pentagon ignoring requests for comment from Reuters. The NRO said it was developing "the most capable, diverse and survivable space intelligence, surveillance and reconnaissance system the world has ever known," but it declined to comment on SpaceX's role in the project.

SpaceX's CEO has already acknowledged the development of the military alternative to the "civilian" Starlink system, declaring in September that this system would be "owned by the US government" and controlled by the Department of Defense.

“Starlink should be a civilian network, not a combat participant,” Musk said, referring to Ukraine's use of satellites throughout the conflict with Russia.

Musk donated about 20 Starlink terminals to Ukraine shortly after Russia launched its military operation in February 000. Since then, Kiev's troops have relied heavily on the system to maintain communications and operate combat drones along the front line.

While pledging to support Ukraine, Musk has repeatedly stated that he favors a peaceful resolution to the conflict. The billionaire drew the wrath of American authorities after refusing kyiv's request to use the Starlink network to facilitate strikes on the Russian Black Sea fleet. Musk argued that activating Starlink in Crimea would violate US sanctions. In the absence of direct orders from US leaders, SpaceX chose not to violate regulations despite kyiv's request, the tycoon explained.

Earlier this month, US lawmakers reportedly launched another investigation into SpaceX, after Ukraine claimed Russian troops allegedly used the Starlink satellite service on the conflict's front lines. Musk denied the allegations, insisting that "no Starlink was sold directly or indirectly to Russia." The Kremlin also insisted that the Russian military never ordered Starlink terminals.

read the article

Last modification by Nathan- 54 there is
EU spy on internet

Digital DawnEU wants to spy on Europeans' internet use

Digital Dawn - Jan 20, 2024

In recent years, outright censorship in all its forms has increased. During the covid madness, government and industry teamed up to create a censorship-industry complex to more effectively promote false narratives and silence dissent.

   

The European Commission is an EU legislative body with regulatory authority over digital technology. Article 45 of the EC's proposed eIDAS Regulation would deliberately weaken certain aspects of internet security that the industry has carefully developed and strengthened for over 25 years. This article would in effect grant the 27 EU governments very broad surveillance powers over Internet use.

The rule would require all Internet browsers to trust an additional root certificate from an agency (or regulated entity) of each of the national governments of each of the EU member states. For non-specialist readers, I will explain what a root certificate is, how trust in the internet has evolved and what Article 45 brings in this regard. Next, I'll highlight some comments from the tech community on this issue.

The next section of this article explains how the Internet's trust infrastructure works. This context is necessary to understand how radical the proposed article is. The explanation is intended to be accessible to a non-technical reader.

The regulation in question concerns internet security. By “internet” here we mean, to a large extent, browsers that visit websites. Internet security has many distinct aspects. Article 45 aims to change public key infrastructure (PKI), which has been part of internet security since the mid-90s. PKI was first adopted and then improved over a period of 25 years, in order to give users and publishers the following guarantees:

Browser-website conversation privacy: Browsers and websites converse over the Internet, a network of networks operated by Internet service providers and Tier 1 carriers, or cellular carriers. if the device is mobile. The network itself is not inherently secure or trustworthy. Your home Internet service provider, a traveler in the airport waiting room where you're waiting for your flight, or a data provider looking to sell leads to advertisers may want to spy on you. Without any protection, a malicious actor could view confidential data such as a password, credit card balance, or health information.
Ensure that you view the page exactly as the website sent it to you: When you view a web page, could it have changed between the editor and your browser? A censor may want to remove content they don't want you to see. Content labeled as “disinformation” was largely removed during the covid hysteria. A hacker who stole your credit card might want to remove evidence of their fraudulent spending.
Ensure that the website you see is the one in the browser's address bar: When you log into a bank, how do you know you are seeing that bank's website, and not a fake version that looks the same? You check your browser's address bar. Could your browser be tricked and show you a fake website that looks identical to the real one? How does your browser know – for sure – that it is connected to the right site?

In the early days of the internet, none of these guarantees existed. In 2010, a browser plugin available in the add-ons store allowed the user to join another person's Facebook group chat at a hotspot cafe. Today, with ICP, you can be pretty sure of these things.

These security features are protected by a system based on digital certificates. Digital certificates are a form of identification – the internet version of a driving license. When a browser connects to a site, the site presents it with a certificate. The certificate contains a cryptographic key. The browser and website work together using a series of cryptographic calculations to establish secure communication.

Together, the browser and the website provide the three security guarantees:

- confidentiality: by encrypting the conversation.
- cryptographic digital signatures: to ensure that content is not modified in flight.
- publisher verification: through the chain of trust provided by the ICP, which I will explain in more detail below.

A good identity should be difficult to counterfeit. In ancient times, the wax casting of a seal served this purpose. Human identities rely on biometrics. Your face is one of the oldest shapes. In the non-digital world, when you need to enter an age-restricted venue, for example to order an alcoholic drink, you will be asked for photo ID.

read the article

Last modification by Nathan- 54 there is
spy smartphone

Something fishyYour phone is a spy for the authorities

Eel under the Rock - Jul 13, 2023

Smartphone and privacy, an oxymoron in the era of mass surveillance? Yes, according to a Comparitech report.

   

You may think of your phone as a tool for communication, entertainment and productivity, but it's also a gateway for authorities to spy on you. Indeed, France is not the only country to have passed a law allowing the police to take remote control of suspects' devices, with access to cameras, microphones and GPS data.

The French Minister of Justice, Éric Dupond-Moretti, welcomed the adoption of new legislation authorizing this type of espionage for a maximum period of six months, with the authorization of a judge, in cases where the penalties incurred are at least five years old. "We are a long way from the totalitarianism of 1984," he added. "Human lives will be saved."

Obviously, the fact that a police or government agent could hack into your phone and casually observe a live stream of your life sounds like the most obscene invasion of privacy. And clearly, this opens the door to occasional abuses of civil liberties by those in positions of power, as well as more targeted abuses of that power by actors in bad faith.

But this practice is far from new, let alone rare. In 2006, before the release of the first iPhone, the US FBI remotely activated cellphone microphones (even with the phones turned off) and listened to suspects, completely legally. Back then, you could still remove the batteries from many phones. Now not so much.

read the article

Last modification by Nathan- 54 there is
spy phone

Something fishyJustice law: how the police will spy on your phone

Eel under the Rock - Jul 10, 2023

Despite the fears expressed, the National Assembly has just authorized the possibility of transforming smartphones into “snitches” within the framework of certain legal investigations.

   

Being able to remotely activate a smartphone, laptop or any connected object in order to see and hear their owners is no longer a dystopia. After the Senate, it is the turn of the National Assembly to approve the possibility of remotely activating the cameras and microphones of these everyday devices.

The goal is to be able to listen to and film people targeted in organized crime and terrorism investigations. This is a key article of the justice programming bill.

While some see this as a serious breach of users' privacy and privacy, these measures should only be taken in very specific cases. In order, precisely, to avoid any overflow. This key article brought 80 deputies in agreement while 24 elected officials said they were against.

read the article

Last modification by Nathan- 54 there is
chinese ball

Réseau InternationalThe “balloon” mess: Lies galore

International Network - Feb 09, 2023

If the U.S. government, including the president and the Pentagon, were telling the truth, the week-long incursion of Chinese balloons into U.S. territory proved to be one of the most effective spy missions ever attempted against US air and missile defenses in recent memory.

   

If the Chinese government was telling the truth and the balloon was nothing more than an “unmanned civilian airship” out of control due to force majeure, the result is exactly the same. It is also the same result if the Chinese lied and the balloon was a military intelligence operation.

And if American officials lied, hid what they knew about the balloon's mission, the conclusion remains the same: the balloon revealed to the enemies of the United States the fundamental weaknesses of the United States' war against Russia and China. . ; and also to American allies in the Ukrainian battlefield, Japan, Korea, Canada and Australia to see for themselves.

The public record is slow to be released on what exactly happened when the giant balloon entered the airspace between the Russian Kuril Islands and the American Aleutian Islands; then entered US territorial waters and made landfall over Alaska, then Canada, then the United States again.

Published maps available in US media have all been distorted by projections and estimates based on weather data and observations reported to the press by people on the ground.

Precise data on flight path, speed, electronic signals to and from the airship and evidence of control (or lack of control) over its operations are military secrets – American, Chinese, Russian.

However, it is not necessary to open them to draw several conclusions. For the moment, and in the absence of more evidence, the following is a handful of certainties validated by the probabilities.

This is the test that American juries do to convict in cases of fraud.

The first certainty is that the balloon was detected by US military and civilian trackers long before it reached US territorial waters off the Aleutian Islands (Alaska).

read the article

Last modification by Nathan- 54 there is
SIM card - cookie

The strategist's letterHow your SIM card is spying on you without your knowledge

The mail from the strategists - 15 Jan 2023

Marc German returns in the second week to the security of smartphones

   

I received again Marc German, specialist in digital security, who had already given us an edifying interview on this subject. Today, he more particularly evokes the question of the SIM card and the capacity of this tiny object to spy on you and to know everything about you.

An essential interview to protect you against the caste police.

Last modification by Nathan- 54 there is
US economic war

Réseau International"Silent war": An ultraviolence that does not say its name

International Network - Jan 01, 2023

The documentary "Silent War" shows how, like the boa constrictor that wraps itself around its prey and slowly suffocates it, the United States has chosen to wage an ultra-violent and unfair economic war against Europe by resorting to manipulation and espionage.

   

A conflict can also take place without firearms. It can be more insidious but the damage is very real and often extremely serious.

source: CGTN French

Last modification by Nathan- 54 there is
tracing cryptos

Digital DawnService to monitor cryptocurrency users for the highest bidder

Digital Dawn - 19 Dec 2022

US secret spy firm promises to monitor cryptocurrency users for highest bidder

   

Leaked files reviewed by MintPress expose how intelligence agencies around the world can track cryptocurrency transactions to their source and therefore identify users by monitoring the movements of smartphones and Internet of Things (IoT) devices ), such as Amazon Echo. The content comprehensively explodes the myth of cryptocurrency anonymity, and has serious implications for individuals and states seeking to shield their financial activity from the prying eyes of hostile governments and authorities.

read the article

Last modification by Nathan- 54 there is
US military bases around the world

Jacob's ladderOnline tool to map US military bases around the world

Jacob's Ladder - Nov 21, 2022

World Beyond War has launched a new online tool that allows users to view a marked globe of 867 US military bases in countries other than the United States.

   

The tool allows you to zoom in to get a satellite view and detailed information about each base. It also allows filtering the map or list of bases by country, type of government, date of opening, number of employees or occupied land area.

This visual database was designed and developed by World Beyond War to help journalists, activists, researchers and individual readers understand the immense problem of over-preparedness for war, which inevitably leads to international intimidation. , interference, threats, escalation and mass atrocities. By illustrating the extent of America's military outpost empire, World Beyond War hopes to draw attention to the larger issue of war preparations.

The United States of America, unlike any other nation, maintains this massive network of foreign military installations around the world. How was it created and how does it continue? Some of these physical facilities are on lands occupied as spoils of war.

Most are maintained through collaborations with governments, many of which are brutal and oppressive governments that benefit from the presence of the bases. In many cases, human beings have been displaced to make space for these military installations, often depriving people of agricultural land, adding enormous amounts of pollution to local water systems and air, and existing as an unwanted presence.

Full article on Jacob's Ladder

access the site

Last modification by Nathan- 54 there is
British terrorism

Réseau InternationalBritish spies are building a secret terror army in Ukraine

International Network - Nov 09, 2022

Documents obtained by The Grayzone reveal plans by a cell of British military intelligence figures to organize and train a secret army of Ukrainian "partisans" with explicit instructions to attack Russian targets in Crimea.

   

On October 28, a Ukrainian drone attack damaged the flagship of the Russian Black Sea Fleet in the port of Sevastopol, Crimea. Moscow immediately accused Britain of aiding and orchestrating the attack, as well as blowing up the Nord Stream pipelines – the worst acts of industrial sabotage in recent memory.

The UK Ministry of Defense issued a scathing denial in response, calling the charges "misrepresentations of epic proportions". Whoever is behind these specific attacks, suspicions of a hidden British hand in the destruction are not unfounded. The Grayzone has obtained leaked documents, in which British intelligence agents sign an agreement with the Odessa branch of the Ukrainian security services, to create and train a secret army of Ukrainian partisans.

Plans called for the secret army to carry out sabotage and reconnaissance operations in Crimea on behalf of Ukraine's Security Service (SSU) - precisely the type of attacks seen in recent weeks.

read the article