Military surveillance dirt boxes now in the hands of police
Posted by Editor, cairnsnews
Military surveillance technology “Dirt Boxes” that can intercept data, calls and text messages from hundreds of mobile phones simultaneously, as well as jam transmissions from a device, according to documents obtained, are being used by USA Police and in the balance of probabilities Australian police.
StingRay is a radio interception device when deployed forces mobile phones in a given area to connect to it instead of a legitimate communications tower. A computer attached to a StingRay allows investigators access to a trove of data from intercepted mobile phones, including call and messaging logs, geolocation data and handset information.
KingFish is a less-expensive, more-portable version of a StingRay. Some records indicate that while a StingRay is intended to be mounted in and controlled from a vehicle, a KingFish can be remotely controlled and even be worn by its user.
The StingRay and KingFish manufactured by Haris Corporation are sold as part of a larger surveillance kit which includes third-party software designed by Pen-Link, a company that makes programs for cellphone forensics, .and laptops by Dell and Panasonic.
Whistleblower like Julian Assange and Edward Snowden alerting us to government spooks spying on citizens that is a violation of the freeworld, now we have police services that are far from squeaky clean and unaccountable availing themselves of technology to spy without consequence.
With knowledge of person in Western Australia suspecting police were illegal spying on him and others set in place a network of sophisticated telecomunication traps to confirm or refute suspicions. All 10 traps were sprung confirming illegal spying with a bonus find uncovering a compliant well known large national internet provider colluding information to WA Police that will be revealed from our source soon after the lines of red-herrings being planted by our source across Western Australia finds it no longer entertaining.
With enforcers illegally or legally harvesting people’s emails and SMS messages, information gathered will be legible unless encrypted. Today is the day to start encrypting?
How to secure you telecomunication
For messaging from PC,MAC, Tablet, or Smart-phones, the answer is a tidy high security free APP that is simple to use “wickr” (download www.wickr.com ) that works like a personal sms platform encrypting automatically every transmission and leaves no meta file footprints. You can set it to hold messages from one minute to one week before shredding. It also can send pictures and files.
Email encryption has until now been somewhat complicated for the average user. A Switzerland based email very high encrypting service called ProtonMail really has big brother locked out offering this service FREE, and again like Wickr it removes all metadata foot prints from transmissions. It is web-based (like Gmail and Hotmail but without any backdoor access to big brother) and capable of dealing with unencrypted mail or the option of sending encrypted mail to recipients that do not have protonmail service. There is a qualifying period to obtain an account that takes up to a month depending when server space becomes available – www.protonmail.com.
Big Brother In Action
With our Australian government, led by the Attorney General George Brandis, are introducing legislation for meta data retention by your internet service provider to hold for seven years, a process now abandoned by the rest of the world reflecting just how far out of touch our government is with spying techniques. These user friendly personal security tools for your email and messaging lock out big-brother along with any other prying eyes limiting the threat of identity theft.
Sending an email to anyone is like snail mailing a postcard, anyone can read it – sending an encrypted email is a locked box that only you and the recipient have the key to.
Law enforcers and security agencies have never had it this good since the incideous “Facebook & Twitter” were introduced to harvest millions of addicted users writings as they reveal everything daily saving governments $$$ in surveillance costs.
This picture shows how government agencies from anywhere syphon ALL telecommunication traffic into their databases to be assessed for WHAT? – A very small percentage will be national security issues, the rest we would suggest is to protect their power base along with control of the people.
Start using Wickr and register for ProtonMail today engaging family, business associates, plus friends to protect their personal space as you have done online.
There is a requirement for national security surveillance, there is no need for government mass harvesting citizens personal information, which does suggests flaws in their intelligence service or an agenda outside the security of the people.
“What do you think”
SOS-NEWS Investigation Team
About Editor, cairnsnewsOne of the few patriots left who understands the system and how it has been totally subverted under every citizen's nose. If we can help to turn it around we will, otherwise our children will have nothing. Our investigations show there is no 'government' of the people for the people of Australia. The removal of the Crown from Australian Parliaments, followed by the incorporation of Parliaments aided by the Australia Act 1987 has left us with corporate government with policies not laws, that apply only to members of political parties and the public service. There is no law, other than the Common Law. This fact will be borne out in the near future as numerous legal challenges in place now, come to a head soon.
Posted on August 17, 2015, in agenda21, corruption, Federal Politics, General, international, People Control, Police, Politics and tagged big brother, Brandis, dictatorship, dirt boxes, Edward Snowden, enforcers, George Orwell, internet surveillance, Julian Assange, people control, police, spying, Sting Ray, surveilllance, unaccountable. Bookmark the permalink. Leave a comment.
This site uses Akismet to reduce spam. Learn how your comment data is processed.