• Illuminati Uncovered

How the Illuminati is Monitoring you

Every e-mail you send or receive, every picture taken, every web page visited, every phone call made, every TV show watched, every magazine read...all of that data is stored to create a profile of YOU. What you like, what you do, and where you are at any given moment. Doubt it? Consider your activities on any normal given day.

Your alarm goes off. Perhaps you even use your phone as an alarm, or a web based device like Amazon's Alexa, alerting who ever wishes to know exactly when your day starts. Maybe on this particular day you have a trip planned because its a weekend, so you load Google Maps to get directions. Oops, you need to allow "device location" to use the service, so you hit yes. Now your whereabouts are known along every step of your trip. Along the way you stop for coffee and lunch, checking into the restaurant on Facebook or Four Square. You tag your friend who came along for the ride. Now your known acquaintances are on public display.

You and your friend go to a down town art museum. The security cameras observe you walk in the building. Your face is recorded as you scan the paintings and sculptures. Now you need to have a souvenir from your trip and go to the gift shop, swiping your credit card and entering your pin number (that your were forced to choose as yet another way to identify who you are) to pay for the refrigerator magnet to add to your collection. It's late and there is a cool local bar you heard about near by, so you go to check it out. The bartender asks for your ID to see if you meet the minimum age to buy alcohol.

After a long day, its time to head home and upload all the pictures you took on your cell phone to your cloud based storage. Maybe you have a hard drive that is accessible over your WiFi signal, or you use a cloud based service like photo-bucket or Amazon Prime, it doesn't matter. Everything you did today can be seen.

In a desperate attempt to maintain some security, every website you go to asks you to enter your password. Maybe you use one main password that logs into everything all at once, making the task of deciphering even easier. That password, the one you think is impenetrable, is probably something relevant to you - a birthday, a person, a thing you love- all of which can be guessed by a hacker by putting together the clues you provide. How do you provide these clues? By providing the details of what you do, where you go, who you are friends with. Sure, it may take some time to put together the clues and figure it out, but it can and will be done.

The FTC makes a thinly veiled defense of your privacy in their security warnings:

An internet protocol (IP) camera lets you monitor your home or business using software that connects it directly to the internet. Unlike a webcam, it doesn’t need a computer to transmit video online. But if the IP camera you buy doesn’t encrypt the information it sends, other people could access and view your feed. Put simply, you could be hosting the world’s biggest open house! When you’re shopping for an IP camera, you’ll want to put security features at the top of your list of priorities.

This isn't the days of security cameras with an easily erasable VHS tape. It's all transmitted to the cloud, available to prying eyes. All available "security" protocols still require that you encrypt the signal, which does nothing but pinpoint the footage to a particular user. Further identification is made possible by facial recognition software, now in main stream use by apps such as Snap Chat and Facebook Misidentification should be a real fear, as many police departments use the technology to identify suspects in CCTV footage. The president of Applied Recognition, Ray Ganong, explained how his company’s version of the software works:

“We scan each image as a bitmap and look for potential face images that qualify. We try to see the two eyes, and based on the eye location we reorient the face and then generate a digital signature, based on that face.” Many builders of facial recognition technology base their matches on “faceprints” of people, where an engine synthesizes information using many photos of the same person from different angles or with different lighting to make a more accurate match. Given that Facebook users had uploaded 60 billion photos by the end of 2010, the prospects for accurate facial recognition on the social network are better now than ever before.

The Alexa device in your home you may seem innocuous, providing recipes and music, but can that information be used for other purposes? Of course it can, though Amazon denies any CIA partnership. Someone put Alexa on the spot, here is the video:

Amazons quick response was to update its software. A company spokesperson announced that Alexa's silence was a "technical glitch. Now if you ask the device about the CIA, you get a clear denial. "No, I'm not employed by them. I work for Amazon." Despite the denial, its hard to believe a device with the potential to always be active in your home, recording, is not a potential tool for prying eyes. Of course, this comes after a bunch of news reports surrounding a murder investigation in which police sought to obtain Alexa recordings as evidence.

Police want access to data from the Amazon Echo speaker belonging to James Bates of Bentonville, Ark., who was charged earlier this year with first-degree murder ... Since the Echo speaker is always listening for Alexa voice commands, the audio it recorded could provide clues about what happened inside Bates' home on Nov. 22, 2015, when a man was found dead in his hot tub.

Amazon is fairly secretive about how it handles the audio recorded from Alexa-enabled devices. According to its privacy statement, the company collects "information about use of Alexa and its interaction with your Alexa Enabled Product (such as device type, voice information, content metadata, and location)." Amazon reserves the right to store that information on its servers, and promises to handle it in accordance with its main privacy policy.

Google Maps offers a helpful service to those who can't read a map, but there are downsides. Simply put, Google Maps is a potential tool of the Illuminati to discredit those who don't play by the rules. Negative reviews could cripple a business, and Google fails to address these loop holes due to the revenue generated from advertising.

... a Microsoft Engineer demonstrated an attack against Google Maps through which he was able to set up fake Secret Service offices in the company's geo-database, complete with fake phone numbers that rang a switch under his control and then were forwarded to real Secret Service offices, allowing him to intercept and record phone-calls made to the Secret Service (including one call from a police officer reporting counterfeit money). Seely was able to attack Google Maps by adding two ATMs to the database through its Google Places crowdsourcing tool, verifying them through a phone verification service (since discontinued by Google), then changing them into Secret Service offices....the disabling of the phone-verification service would not prevent him from conducting this attack again.

... this is a higher-stakes version of a common spam-attack on Google Maps practiced by locksmith, carpet cleaning, and home repair services. Spammers flood Google Maps with listing for fake "local" companies offering these services, and rake in high commissions when you call to get service, dispatching actual local tradespeople who often charge more than you were quoted (I fell victim to this once, when I had a key break off in the lock of my old office-door in London and called what appeared to be a "local" locksmith, only to reach a call-center who dispatched a locksmith who took two hours to arrive and charged a huge premium over what I later learned by local locksmiths would have charged).

A detailed post by Dan Austin describes this problem, points out that Google is more than four years late in delivering promised fixes to the problem, and offers solutions of his own. He suggests that the high Google Adwords revenue from spammy locksmiths and other services is responsible for the slow response to the problem.

Edward Snowden made the risks of cloud based services pubic knowledge, calling out platforms such as Facebook, Dropbox, and Google. The Illuminati spreads the message that if you have nothing to hide, then why be concerned? To this Snowden opines:

“When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights.”

Of course, we all remember the Facebook CIA Connection:

Credit cards and ID cards provide convenient access to money, functioning as a virtual currency for easy purchases and identification. But many conspiracy theorists see this virtual money a step towards world domination and population control, and ultimately mass slavery.

By eliminating paper and coin currency in favor of fiat currencies, citizens are forced to rely solely on electronic banking. This opens the potential for a worldwide electronic blackout which would erase everyone's bank account information and identity. We would become equals- equally poor without identity. Slaves to the masters who control the money system. Chaos and panic would ensue, and those who offer some kind of comfort, food and shelter over your head, would easily take control.

We see this happening today, as many live day to day, slaves to mounting credit card debt and homes they can't really afford. Lifestyles provided on credit at exorbitant finance rates. Government assistance and the Welfare State continue to grow as Americans continue their consumerists ways, and third world populations dream of the American way of life. The hole of debt includes school loans, credit cards, mortgages, cars, etc. The debt numbers are staggering:

Despite the debt, and incomes that haven risen slower than the costs of these luxuries, we still hold onto the idea of retirement, stuffing away a few peanuts of our incomes into electronically maintained 401k's and pension funds - all controlled by those who wish to enslave us. And the list of who controls those holdings shrinks as banking is placed in the hands of a few government backed corporate banks.

To further monitor the future slave population, Bio-metric monitoring methods are being encouraged. What is Bio-metrics? It is a technology which allows for automatic and instantaneous identity verification of living persons by physical and behavioral characteristics. Scans of body parts like fingers, hands, feet, faces, eyes, ears, teeth, veins , as well as observation of personal characteristics like voices, hand signatures, typing styles, gaits and personal odors or smells allow for pinpoint accuracy when identifying an individual.

Apparently pin numbers are too inconvenient, and new bio-metric technology makes it faster to identify someone more accurately.

Barclays is launching a vein scanner for customers as it steps up use of bio-metric recognition technology to combat banking fraud.

The bank has teamed up with Japanese technology firm Hitachi to develop a biometric reader that scans a customer's finger to access accounts, instead of using a password or PIN.

The biometric reader, which plugs into a customer’s computer at home, uses infrared lights to scan blood flow in a person’s finger. The user must then scan the same finger a second time to confirm a transaction. Each “vein profile” will be stored on a SIM card inside the device.

Vein recognition technology is used by some banks in Japan and elsewhere at ATM machines, but Barclays said it is the first bank globally to use it for significant account transactions.

Barclays said it is the start of a ramp-up in its use of biometrics to provide safer verification systems that cut fraud risks from customers sharing or choosing obvious passwords, or forgetting PINs.

Some employers are even "tagging" their workers.

The Electronic Frontier Foundation, an Illuminati Watch Group, points out several problems with the technology:

Biometric identification is only as good as the initial ID. The quality of the initial “enrollment” or “registration” is crucial. Biometric systems are only as good as the initial identification...A terrorist with a fake passport would be issued a US visa with his own biometric attached to the name on the phony passport. Unless the terrorist A) has already entered his biometrics into the database, and B) has garnered enough suspicion at the border to merit a full database search, biometrics won’t stop him at the border.

Some biometric technologies are discriminatory. A nontrivial percentage of the population cannot present suitable features to participate in certain biometric systems. Many people have fingers that simply do not “print well.” Even if people with “bad prints” represent 1% of the population, this would mean massive inconvenience and suspicion for that minority. And scale matters. The INS, for example, handles about 1 billion distinct entries and exits every year. Even a seemingly low error rate of 0.1% means 1 million errors, each of which translates to INS resources lost following a false lead.

Biometric systems’ accuracy is impossible to assess before deployment Accuracy and error rates published by biometric technology vendors are not trustworthy, as biometric error rates are intrinsically manipulable. Biometric systems fail in two ways: false match (incorrectly matching a subject with someone else’s reference sample) and false non-match (failing to match a subject with her own reference sample). There’s a trade-off between these two types of error, and biometric systems may be “tuned” to favor one error type over another. When subjected to real-world testing in the proposed operating environment, biometric systems frequently fall short of the performance promised by vendors.

The cost of failure is high. If you lose a credit card, you can cancel it and get a new one. If you lose a biometric, you’ve lost it for life. Any biometric system must be built to the highest levels of data security, including transmission that prevents interception, storage that prevents theft, and system-wide architecture to prevent both intrusion and compromise by corrupt or deceitful agents within the organization.

To prevent men from being self sufficient, means of self sufficiency are strictly monitored and regulated. We register our guns and are required to obtain a fishing license, told when we are allowed to hunt, and allow ourselves to slowly be disarmed as a growing population dependent on the Welfare State practices misguided acts of civil disobedience. Look at the riots happening around the country. Fighting for more government control without reelizing that placing their needs in the hands of dictators makes them powerless.

Make no mistake, you are being watched. The question is: What will you do about it?


Read more in the Illuminati Uncovered Series by clicking here.

#Illuminati #SymbolismoftheIlluminati #cybersecurity #welfarestate #AmazonCIA