Jacob Applebaum Video: NSA Spying details - really scary stuff

Here is the transcript:

_http://www.nakedcapitalism.com/2014/01/jacob-appelbaum-30c3-protect-infect-militarization-internet-transcript.html

And here the passage (without slides)

Okay. We all know about TEMPEST, right?

Where the NSA pulls data out of your computer, irradiate stuff and then grab it, right? Everybody who raised their hand and said they’re not surprised, you already knew about TEMPEST, right? Right? Okay. Well, what if I told you that the NSA had a specialized technology for beaming energy into you and to the computer systems around you, would you believe that that was real or would that be paranoid speculation of a crazy person?

[laughter]

Anybody? You cynical guys holding up your hand saying that you’re not surprised by anything, raise your hand if you would be unsurprised by that.

[laughter]

Good. And it’s not the same number. It’s significantly lower. It’s one person. Great.

Here’s what they do with those types of things. That exists, by the way. When I told Julian Assange about this, he said, “Hmm. I bet the people who were around Hugo Chavez are going to wonder what caused his cancer.” And I said, “You know, I hadn’t considered that. But you know, I haven’t found any data about human safety about these tools. Has the NSA performed tests where they actually show that radiating people with 1 kilowatt of RF energy at short range is safe?”

[laughter]

My God!

No, you guys think I’m joking, right? Well, yeah, here it is.

This is a continuous wave generator, a continuous wave radar unit. You can detect its use because its use is between 1 and 2 GHz and its bandwidth is up to 45 MHz, user adjustible, 2 watts using an internal amplifier, external amplifier makes it possible to go up to 1 kilowatt.

Just going to let you take that in for a moment. [clears throat] Who’s crazy now?

[laughter]

Now, I’m being told I only have one minute, so I’m going to have to go a little bit quicker. I’m sorry.

Here’s why they do it. This is an implant called RAGEMASTER.

It’s part of the ANGRYNEIGHBOR family of tools,

[laughter]

where they have a small device that they put in line with the cable in your monitor and then they use this radar system to bounce a signal – this is not unlike the Great Seal bug that [Leon] Theremin designed for the KGB. So it’s good to know we’ve finally caught up with the KGB, but now with computers. They send the microwave transmission, the continuous wave, it reflects off of this chip and then they use this device to see your monitor.

Yep. So there’s the full life cycle. First they radiate you, then you die from cancer, then you… win?


Okay, so, here’s the same thing, but this time for keyboards, USB and PS/2 keyboards.

So the idea is that it’s a data retro-reflector.

Here’s another thing, but this one, the TAWDRYYARD program, is a little bit different. It’s a beacon, so this is where probably then they kill you with a drone.

That’s pretty scary stuff.

They also have this for microphones to gather room bugs for room audio. Notice the bottom. It says all components are common off the shelf and are so non-attributable to the NSA. Unless you have this photograph and the product sheet. Happy hunting.


[applause]

And just to give you another idea, this is a device they use to be able to actively hunt people down.

This is a hunting device, right? Handheld finishing tool used for geolocation targeting handsets in the field.

So. Who was not surprised by this?

I’m so glad to have finally reached the point where no one raised their hand except that one guy who I think misheard me.

[laughter]

Or you’re brilliant. And please stay in our community and work on open research.

[somebody off mike says something]

Yeah! And if you work for the NSA, I’d just like to encourage you to leak more documents.

[laughter, applause, cheers, ovation]

:shock:

M.T.
 
Minas Tirith said:
Here is the transcript:

_http://www.nakedcapitalism.com/2014/01/jacob-appelbaum-30c3-protect-infect-militarization-internet-transcript.html

Thanks for the link Minas T. :thup:
 
Speaking of cars, do a web search on "black box in cars" and a wealth of information becomes available. I like to offer this because the result can be either entertaining or enlightening, depending upon ones awareness.

For years... years... I have been shooting off about the GPS abilities on cars. How I bet the gubemint is going to use GPS to tax people and collect revenue by the mile. "They're gonna rip us off man..."

I may be wrong but I figure people would get upset and actually begin to think when I point out the money stolen out of your pocket aspect. I've notice people are pretty much sleepy but tend to stir and arouse when they see money going out of their pockets to the taxman.
:evil: :evil: :evil:
 
A new app called Name Tag will match strangers picture to their online profiles

_http://massprivatei.blogspot.com/2014/01/a-new-app-called-name-tag-will-match.html

An upcoming app for Android, iOS, and Google Glass called NameTag will allow you to photograph strangers and find out who they are -- complete with social networking and online dating profiles.

"People will soon be able to login to www.NameTag.ws and choose whether or not they want their name and information displayed to others," he said. "It's not about invading anyone's privacy; it's about connecting people that want to be connected. We will even allow users to have one profile that is seen during business hours and another that is only seen in social situations."

Spot someone out and about that you want to identify, and you can capture their face using your device's camera. The app will send the photo wirelessly to NameTag's server, where it will compare the photo to millions of online records and return with a name, more photos, and social-media profiles, such as Facebook, Twitter, and Instagram, where the person (or their friends) might have publicly posted photos of themselves.

And, if you're interested in that person in a more-than-passing fashion, the app's creator -- FacialNetwork -- is working on technology that will allow scanning of profile pictures on online dating sites, such as Plenty of Fish, OKCupid, and Match.com.

In the US, it will also match the photo against more than 450,000 entries in the National Sex Offender Registry and other criminal databases.

"I believe that this will make online dating and offline social interactions much safer and give us a far better understanding of the people around us," said FacialNetwork's Kevin Alan Tussy. "It's much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page, or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that."

The CredentialME app uses facial recognition to identify strangers:

The Android App – CredentialME AppLock FaceR CredentialME AppLock enables the Android smart phone user to use Facial Recognition as the biometric authentication to unlock any application installed on the user’s Android device. CME AppLock provides the options of either letting the device camera automatically take a picture of your face and thereby verify via Face Recognition the user or use a password to secure the user’s choice of applications on the handset. FaceR CredentialME is the most impressive and accurate face recognition platform. Based on the same technology used by the U.S. Department of Defense, FaceR CredentialME accurately verifies your identity using only your face. CredentialME demonstrates real facial recognition authentication utilizing cloud-based web service facial search and retrieval applications.

The iPhone App – CredentialME FaceR CredentialME for the iPhone does the same face recognition and authentication as the Android CredentialME AppLock only it does not control securing individual applications on the iPhone.Both applications can be used as a second factor authentication via bundling with third party applications.With the advancement of smartphones and the projected increase in usage for handheld computers, especially with the introduction of 4G, end users are going to be doing things that they just couldn’t do before. More data and personal information is going to be stored and accessed directly from the end user’s mobile phone. Paul Schuepp, President and CEO for Animetrics said, “We’re carrying in our pocket now full functioning powerful computing and communications devices with integrated applications that run our businesses, our social networks, our life. It has become most important to protect our applications so that only I can use my private and personal apps. FaceR CredentialME provides the powerful security of an easy to use biometric. Your face is your credential and only your credential. Enterprises and consumers can use this powerful tool to secure their mobile systems via a wireless connection to a cloud-based security solution”.

Both versions of the FaceR applications are based on Animetrics Patented 2D-3D FACEngineTM Facial Recognition Technology. CredentialME is also offered for use to smartphone application developers to embed for primary or two factor authentication in securing their app.

Headquartered in Conway, N.H., Animetrics is a leading developer of cloud-based web service facial search and retrieval applications. The Animetrics90 and Animetrics180 product family is the first come-to-market 2D-3D enabled full 90 degree and 180 degree facial search engine. Based on three patents, the 2D-3D FACEngineTM technology allows for pose and lighting invariant facial search across a broad range of operating conditions. Animetrics is driving market acceptance of facial recognition biometrics in government, homeland security, law enforcement, and now with its recent consumer release of its FaceRTM line, mobile platforms as well, including iPhone and Windows Mobile devices.
 
Odyssey said:
I haven't watched the video yet but I've worked with schizophrenics and such who have so-called delusions that they are being tracked by the government or controlled in some way like having thoughts inserted in their heads, being spied on etc. The clinicians will certainly have a giggle about it and subsequently drug them up the wazoo, which is frequently useless in "treating" these "fixed delusions". My thought is, "What the heck are you guys laughing about? This stuff really happens!" Whether it's true in every case or not, it is surely torturous for the person experiencing it.

Your post reminds me of a so rare article on that matter written some years ago by a psychologist : "On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology"
_http://www.globalresearch.ca/on-the-need-for-new-criteria-of-diagnosis-of-psychosis-in-the-light-of-mind-invasive-technology/7123
 
Google can identify and transcribe all the views it has of street numbers in France in less than an hour, thanks to a neural network that’s just as good as human operators.

_http://www.technologyreview.com/view/523326/how-google-cracked-house-number-identification-in-street-view/

But the task of spotting and identifying these numbers is hugely time-consuming. Google’s street view cameras have recorded hundreds of millions of panoramic images that together containing tens of millions of house numbers. The task of searching these images manually to spot and identify the numbers is not one anybody could approach with relish.

So, naturally, Google has solved the problem by automating it. And today, Ian Goodfellow and pals at the company, reveal how they’ve done it. Their method turns out to rely on a neural network that contains 11 levels of neurons that they have trained to spot numbers in images.

To start off with, Goodfellow and co place some limits on the task at hand to keep it as simple as possible. For example, they assume that the building number has already been spotted and the image cropped so that the number is at least one-third the width of the resulting frame. They also assume that the number is no more than five digits long, a reasonable assumption in most parts of the world.

But the team does not divide the number into single digits, as many other groups have done. Their approach is to localize the entire number within the cropped image and to identify it in one go—all with a single neural network.

They train this net using images drawn from a publicly available data set of number images known as the Street View House Numbers data set. This contains some 200,000 numbers taken by Google’s Street View cameras and made publicly available. The training takes about six days to complete, they say.

Goodfellow and co say there is no point in using an automated system that cannot match or beat the performance of human operators who can generally spot numbers accurately 98 percent of the time. So this is the team’s goal.

However, that doesn’t mean spotting 98 percent of the numbers in 100 percent of the images. Instead, Goodfellow and co say it is acceptable to spot 98 percent of the numbers in a certain subset of images, which in this case turn out to cover around 95 percent of the total.
 
Rise said:
Is there a reason why sott and the forum do not use SSL? Maybe it doesn't matter since all the certificate authorities are probably compromised as well.

Bingo!

Of course, you CAN browse this forum via HTTPS. Just change the URL to HTTPS, and browse away. Also be sure to change any bookmarks to the forum to use HTTPS instead of just HTTP. HTTPS for Sott.net is not possible because of embedded videos. Everyone complains about the "this page is not totally secure" message, and/or certain videos simply don't work since many popular streaming services don't have SSL. YouTube does.

But, yeah... If it's publicly available, consider it hacked. You don't crack encryption by brute force methods involving a supercomputer the size of Germany - you think laterally and break it via a chink in the math or protocol involved. I chuckled when he was talking about how TLS "breaks" their little man-on-the-side attack. Well, maybe it does, but considering all the other toys they have, does it really matter?

As for his talk about beaming people, he was not specifically talking about actual mind control. They radiate a computer (and thereby the person sitting by it) with 1-2GHz radio waves, and the embedded "responder bugs" send back keystrokes, data, location info, whatever.

Of course, there is more than enough other information available about real mind control that it doesn't matter much. Plus, radiating somebody with up to 1kW of microwave-frequency RF will most certainly do something "not good" to them. :shock:

All in all, this stuff is not that amazing. Hell, I dreamt up stuff like this years ago when I was in college. Imagine what roomfuls of Evil Techies would come up with! The only thing required is lots of knowledge about how technology works - and lots of money if you want to implement it.

These "leaks" I think are intended more to stir up crap than to actually reveal anything. Remember the movie "Enemy of the State" and the C's comments about it?
 
On the aspect of controlling cars, more and more newer cars are getting electronic steering. So there is total control capability right there, acceleration, brakes, and steering.
 
MrEightFive said:
Everything proceeds as planned :evil:

But why is it so scary? It's just 3D STS technology, still looks silly comparing with 4D STS implants that allow direct thoughts reading/monitoring (incl. total visual and audial channels signals) and influencing/manipulation in 'timeless' fashion. :rolleyes:

Session January 25th said:
A: Sometimes "they" even monitor these communications. Long ago, we told you how technology now exist and makes such things as phone taps, for but one example, totally, completely, and ridiculously obsolete.
Ok, but that be 3D STS technology not makes it less serious or macabre.

Gandalf said:
Minas Tirith said:
Here is the transcript:

_http://www.nakedcapitalism.com/2014/01/jacob-appelbaum-30c3-protect-infect-militarization-internet-transcript.html

Thanks for the link Minas T. :thup:
I second that. Thanks Minas T!
 
Mr. Scott said:
Rise said:
Is there a reason why sott and the forum do not use SSL? Maybe it doesn't matter since all the certificate authorities are probably compromised as well.

Bingo!

Of course, you CAN browse this forum via HTTPS. Just change the URL to HTTPS, and browse away. Also be sure to change any bookmarks to the forum to use HTTPS instead of just HTTP. HTTPS for Sott.net is not possible because of embedded videos. Everyone complains about the "this page is not totally secure" message, and/or certain videos simply don't work since many popular streaming services don't have SSL. YouTube does.

Cool, I didn't realize that was available, I assume you are using a self signed cert.. so yeah the browser is going to freak out.

Mr. Scott said:
As for his talk about beaming people, he was not specifically talking about actual mind control. They radiate a computer (and thereby the person sitting by it) with 1-2GHz radio waves, and the embedded "responder bugs" send back keystrokes, data, location info, whatever.

Yes, and I'm not trying to say that mind control per say isn't possible but that what Jacob is disclosing is not mind control -- just remote viewing of your computer and the actions you take on it.

Mr. Scott said:
These "leaks" I think are intended more to stir up crap than to actually reveal anything. Remember the movie "Enemy of the State" and the C's comments about it?

No, and I can't find it through the search... but I have thought that there is a high probability that all of these disclosures are really controlled. (I've never seen the movie so I'm guessing as to what it is about).
 
Laura said:
Rise said:
As for the beaming... I didn't get a sense that they thought they could "beam" thoughts/things into someone, but more they are just beaming massive amounts of directed radio waves at the person which could cause cancer.
Well, if they can "cause cancer" they can do the other. Read Odyssey's post above. This has been going on for awhile.
I agree, this has been going on for a very long time. The excuse of 'national security' apparently trumps all moral considerations.

After WWII, thus about 60 years ago now, the CIA, following its clandestine acquisition of Nazi 'scientists' through Operation Paperclip, pursued top secret mind control programs called MK-ULTRA and such codenames involving usually unwitting victims, subjecting them to electromagnetic radiation and torture, psychotropic drugs like LSD and other horrific forms of abuse.

One objective that the CIA reportedly explored and was able to achieve was the capability to focus directed microwave energy that was modulated at audible frequencies on targets, that is, people's heads, in order to project 'voices'.

I suspect that the CIA et al decided that it wasn't an effective technique because, without prior mind control programming, it couldn't reliably predict or control the subjects' reactions. They certainly can do that, and worse, but it seems that they instead decided on mind control along with old-fashioned duplicity, skullduggery and tradecraft.

See Sirhan Sirhan who allegedly assassinated Robert Kennedy (but didn't fire the fatal shots), Mark David Chapman who shot John Lennon, and John Hinckley Jr. who tried to assassinate US President Ronald Reagan - all arguably mind controlled.
 
Mr. Scott said:
[
These "leaks" I think are intended more to stir up crap than to actually reveal anything. Remember the movie "Enemy of the State" and the C's comments about it?

That's what I thought. These warehousing data is done by every major corporation for last 15+ years with the legally acquired information. yes this is massively ridiculous scale which no human can ever understand, any means they come up with connecting the dot will be marred with gigantic issues (which they don't care) and there has been leaks of it for last 10+ years. Initially they denied it, ignored it , then so called leakers( now ptb can say "you know it, so what?"). looks to me, feeding all these ptb chain of command for some thing else.

If one starts with grand project, they must have a goal, whether every body knows or not. C's said 94% are human containers.

This makes me think, Do they have some controlled mutation of bodies with signals(what ever) alive or dead?. some how that portion doesn't seem to get leaked that much, even if it is leaked that is through a some lunatic to be dismissed. Does all these gradual food,water,drug,wifi poisoning and massive data collection serving that purpose of monitoring ?. All this massive ridiculous small amounts of data collection is just noise and just intimidation games of chain of command to hide ?. Sorry, Sounds extreme, but don't see the purpose for all the depth they are going to infect every thing and any thing.
 
Rise said:
Mr. Scott said:
These "leaks" I think are intended more to stir up crap than to actually reveal anything. Remember the movie "Enemy of the State" and the C's comments about it?

No, and I can't find it through the search... but I have thought that there is a high probability that all of these disclosures are really controlled. (I've never seen the movie so I'm guessing as to what it is about).

Hello Rise. The movie is available on YouTube. Note the tech they were using in 1998.
 
dant said:
Thanks for the Transcript link Minas T.!

Yes, thank you!

I really feel for people, especially children who could not understand the capabilities of these, i don't know, e-psychopathic technologies, and those who would unleash them. When Barry Trower said something like "its no trouble at all" in reference to how easy is it for these things to be done, which is basically what the C's have been saying, moving to a different sphere would be welcomed.
 

Trending content

Back
Top Bottom