Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Freedom Fighter
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Who is Digging into Our Phone & Bank Records; Censoring, Collecting Data & Conducting Surveillance??

% of readers think this story is Fact. Add your two cents.



secure arkansas logo

 

The Weaponizing of Our Federal Government

image credit

Censorship is the suppression of speech, public communication,
and/or other vital information.

Our founding fathers realized the importance of freedom of speech, so they gave it a dignified place in the First Amendment of our U.S. Constitution.

Censorship is bad enough, but let’s not forget the government’s obsession with mass surveillance! The American public is being carefully watched by criminals seated in our own government, and they are abusing their power!

Our phone records AND bank records are being poured over at this time! Exclusive from Fox News:

Federal investigators asked banks to search and filter customer transactions by using terms like “MAGA” and “Trump” as part of an investigation into Jan. 6, warning that purchases of “religious texts” could indicate “extremism,” the House Judiciary Committee revealed Wednesday.

Government officials have suggested that banks query transactions with keywords like Dick’s Sporting Goods, Cabela’s, Bass Pro Shops, and more. So, they are looking for your political and religious expressions to see if you pose a threat.

So, are YOU on the FBI watch list? Think about going to Dick’s Sporting Goods and buying a pair of work pants. Work pants!! Or going to Bass Pro Shops and buying a hat or a fishing pole…
 

image credit

Let’s take a look at how T-Mobile is surveilling the people and justifying this AND their censorship.

In a Terms of Service update of November 2020, T-Mobile quietly announced that, in order to “protect its Customers and provide a supportive environment for messaging services,” Direct Connection Aggregators (DCAs) who signed an agreement with
T-Mobile to provide messaging services… are expected to ensure that each Messaging Campaign is completely compliant with all legal requirements.”

Read what T-Mobile has said, in their own writing:

T-Mobile Code of Conduct Version 2.2 November 2020

With “these policies and best practices, T-Mobile strives to protect subscribers from unwanted messaging…and empower consumer choice.”

[Best Practices is a World Economic Forum (WEF) term that ALWAYS carries a deadly United Nations agenda. Beware of this term in government documents!]

T-Mobile, how can we have the choice if you block them from coming through? How can we decide what we want to see if you decide for us? This is Censorship, but don’t worry, “T-Mobile reserves the right to protect [their] consumers by turning down a messaging campaign on a case-by-case basis,” so they surely will respect the 1st Amendment rights of companies to share a stance on certain issues, along with the rights of private citizens who wish to have free and open communications. Remember, the Supreme Court decided years ago that Companies are entities and therefore also have rights like citizens.

T-Mobile is ensuring that the Direct Connection Aggregators (DCAs) keep their end of the bargain by spying on our text messages. DCAs are required to keep track of who opts in, when, where, how, and at any given moment, provide such information to T-Mobile. The Code of Conduct states:

At any time, T-Mobile may request proof of consumer opt-in. It is the DCA and their content provider requirement to pride [provide] opt-in consent records along with the method of how opt-in was obtained (i.e. Shortcode keyword, website URL, etc.). Below are examples of documented opt-in consent data acceptable by T-Mobile.

• The timestamp of consent acquisition;

• Consent acquisition medium (e.g., cell-submit form, physical sign-up form, SMS keyword, etc.);

• The capture of experience (e.g., language and action) used to secure consent;

Specific campaign for which the opt-in was provided;

IP address used to grant consent;

• The consumer phone number for which consent to receive messaging was granted; and

Identity of the individual who consented (name of the individual or other identifier (e.g., online username, session ID, etc.)). (emphasis ours)

They require the private information of ALL who sign up for the business texts. They’re taking your data whether you like it or not, and they’ll use it as they wish.

If T-Mobile doesn’t get this information as soon as it asks for it, if they don’t like the content of a business’s messages, or if they decide a company sent messages to people who didn’t want them, according to their Code of Conduct, “T-Mobile may, at its discretion, review content for compliance with these policies and best practices may result in the following:

• Non-compliance could result in the suspension of sending rights for a provisioned shortcode, longcode or Toll-Free numbers;

• Restriction daily quota message buckets for 10DLC services;

• Suspension of provisioning rights for new phone numbers; and/or

• Suspension of all network services.

What kinds of messages could potentially be deemed inappropriate? Congress designates what is appropriate in the Telephone Consumer Protection Act. This is a legal means of government and private entities spying on your phone. 10DLC.org is a website for a program introduced by phone carriers to implement laws regarding phone usage. Bing AI was asked to explain what 10DLC is, and it provided:

10DLC stands for 10-digit long code, and it is a program introduced by US carriers to prevent spam/fraud and unwanted messaging 12. It is mandatory for businesses to register their 10DLC numbers with a third-party organization called The Campaign Registry (TCR) 1. The registration process is designed to ensure a positive and secure consumer experience and protect the performance of text campaigns 1. Upon registration, TCR verifies that your business is legitimate, then assigns each number in its registry a trust score which carriers then use to prioritize text message delivery 1. The registration process requires a one-time registration fee as well as a monthly campaign fee 1. To get your registration approved, your business information all needs to be verified and you must adhere to industry best practices as outlined by the Telephone Consumer Protection Act (TCPA) 1. (Administrator) (emphasis ours)

According to 10DLC, the following message categories are prohibited for SMS and MMS:

• High-risk financial service

• Third-party lead generation

• Debt collection and forgiveness

• “Get rich quick” schemes or Multi-level marketing

• Illegal substances

• Gambling

• Sex, hate, alcohol, firearms, and tobacco (SHAFT)

Who decides what is hateful? What about companies that sell firearms? What if a company wants to discuss its support for, or opposition to, something like abortion or the 2nd Amendment? What if a company wants to discuss crimes against humanity? Why can’t we talk about gambling? Churches may want to send messages to their congregation regarding several of these things, but they are not allowed. Is this religious discrimination, barring churches from using these messaging systems?

One interesting part of T-Mobile’s Code of Conduct is “programs must be legal across all 50 states.” This means companies that wish to discuss the legal use of marijuana or the legality of abortion should be very careful what they say. If it’s not legal everywhere, companies are not allowed to discuss it. Isn’t this discrimination against state and local campaigns and businesses? Isn’t it censoring their voice to the local communities? Isn’t it illegal to censor speech REGARDLESS of where it is? When did it become legal to tell people and businesses what we’re allowed to say in a private message? Apparently in 2020. Interesting timing.

Bing’s AI was asked if a telephone company could bar someone from using its towers, and its response was:

Yes, a telephone provider can bar someone from using its towers. The records kept by wireless phone companies about the use of cell phones are immense and very detailed. Wireless companies keep records about when and where a phone call is made, when text messages are sent and received, and when data is transferred 1. These records are known as call detail records and they are different from phone bills. A phone bill is only accurate to the minute since the majority of wireless phone companies bill to the next full minute. This means that a phone call that lasts 15 seconds would show 1 minute on a phone bill 1. Cell phone records, otherwise known as “Call Detail Records”, show the caller’s phone number, duration of call, start and end time of the call, and the cell phone tower the phone was connected to 1. The cell tower, and therefore location, is only available upon request for each connected phone call 1. So, if a telephone provider wants to bar someone from using its towers, it can do so by discontinuing service or blacklisting the phone from its network 1. (Microsoft)

If T-Mobile can bar a number from using its towers, it can ban ANY user from ANY company, not just T- Mobile’s customers. If a company was banned by T-Mobile and decided to use another company, if that company has agreements with T-Mobile to use their towers, the business cannot use them. This means T-Mobile has the ability to ban any phone number, and it’s just banned.

While on the surface, T-Mobile (and Congress) claim this is for our safety, yet the implications are enormous. They’re constantly in the business of protecting us from ourselves. No, thanks. They have obliterated the 4th Amendment right to privacy, as they readily search our phones without warrants. They openly and expressly dissolve the 1st Amendment when they ban free speech. Companies, entities with rights, have the right to free speech, according to SCOTUS.

Interestingly, we have another Presidential Election coming up this November. The last time we had one, in 2020, they implemented this policy. Any bets on why it’s coming to the forefront again?

 

References:

Administrator. (2022). Forbidden Content. https://www.10dlc.org/en/shaft

Microsoft & OpenAI. (2023). Bing Chat [GPT-4 language model]. https://www.bing.com/search 
 

NOTE: Most of the cellular towers in the United States are owned or managed by:

  •  American Tower (A Global Provider of Digital Communications Infrastructure)

Largest shareholders include Vanguard Group Inc, BlackRock Inc., State Street Corp, VGSIX – Vanguard Real Estate Index Fund Investor Shares, Cohen & Steers, Inc., VTSMX – Vanguard Total Stock Market Index Fund Investor Shares, Wellington Management Group Llp, VFINX – Vanguard 500 Index Fund Investor Shares, Geode

  • Crown Castle — Here’s what they say on their website: We are the nation’s largest provider of shared communications infrastructure—including cell towers, rooftop antennas, small cells and fiber networks. This plays in important role in making sure communities like yours can support the data, technologies and wireless services you rely on every day, while paving the way for tomorrow’s innovations. We do all of this through close partnership and cooperation with wireless carriers, telecommunications providers, municipalities, enterprises, utility companies and landowners.

     Again, the largest shareholders are: Spo Advisory Corp, Vanguard Group Inc, BlackRock Inc, State Street Corp and more.  

  • SBA Communications– Here’s what they state on their website: SBA Communications Corporation (SBA) is a leading independent owner and operator of wireless communications infrastructure, including towers, buildings, rooftops, distributed antenna systems (DAS) and small cells. Founded in 1989 and headquartered in Boca Raton, Florida, SBA has operations and offices throughout the Americas, Africa and in Asia. We are listed on NASDAQ under the symbol SBAC and our organization is part of the S&P 500. SBA is also one of the top Real Estate Investment Trusts (REITs) based on market capitalization. 

    Largest shareholders: include Vanguard Group Inc, BlackRock Inc., Cohen & Steers, Inc., State Street Corp, VGSIX – Vanguard Real Estate Index Fund Investor Shares, VTSMX – Vanguard Total Stock Market Index Fund Investor Shares, Principal Financial Group Inc, Geode Capital Management, Llc, Jpmorgan Chase & Co, and VFINX

 

Here are the network operators: AT&T, T-Mobile, US Cellular, and Verizon. Looks like they just lease space on the existing towers. Unfortunately, over the last 20 years, the tower companies have bought towers from wireless carriers.

So, who owns the dangerous 5G cellular towers in the United States? American Tower, Crown Castle, and SBA Communications. Their questionable and devious shareholders are Vanguard, BlackRock, and State Street! We wonder… who controls our government?

The sectors of digital infrastructure include towers, data centers, fiber, and small cells & distributed antenna systems (DAS).

Why should we be concerned about Vanguard and BlackRock? Unfortunately, these “woke” predator investment firms hold significant shares in many of the world’s leading companies. They invest trillions of dollars for their clients. This empire needs to fall!

Chinese investors pour $1 billion into BlackRock’s new fund

Vanguard and BlackRock Funnel U.S. Investment To Chinese Shipyard That Built Third CCP Aircraft Carrier. So, they are helping the Chinese military!

Vanguard Invests in Chinese military-linked companies: report

Americans are ‘unwittingly funding’ blacklisted Chinese companies,l Congressional panel says

New YorkCNN —

A Congressional select committee is investigating BlackRock, the world’s largest asset manager, and MSCI, one of the biggest providers of index funds, to determine whether they are investing Americans’ savings in Chinese companies blacklisted by the US government for security and human rights issues.

The Select Committee on the Chinese Communist Party of the US House of Representatives sent letters to BlackRock (BLK) CEO Larry Fink and MSCI CEO Henry Fernandez on Monday notifying both parties that it is investigating their investments in certain Chinese companies, according to documents reviewed by CNN.

It’s been said that these predator investment companies operate like a cartel. We can definitely see that, too.

Google, Yahoo, and Microsoft Suppressing Free Speech Online

Big Brother (totalitarian government) is here and we need to be aware of all the data collected. That being said, below are two articles about how that technology works.

Internet Censorship (Part 1): The Technology of the Working Web

Below are a couple of snippets. Please click on the above line to understand how censorship works.

Despite the guarantee of free access to information enshrined in the Universal Declaration of Human rights, the number of countries engaging in some kind of internet censorship continues to grow rapidly around the world. The issue of internet censorship is now central in policy, communication, and technology debates. It has also become of interest to scholars in the humanities and social sciences who think seriously about the relationship between culture, politics, and the internet.

But in order to build a rich conversation about the causes and consequences of internet censorship, we must first understand how internet censorship works, especially on a technical level. This two-part post lays out a (simplified) explanation of internet censorship technologies. The first of these gives a broad overview of how the internet works, while the next post builds on these foundations to explain how various censorship techniques can block information on the internet.

 

Internet Censorship (Part 2): The Technology of the Working Web.

Below are a couple of excerpts. Please click on the above link to understand more about how censorship works.

Internet censorship, like all censorship, can take multiple forms, from filtering and blocking content to monitoring and penalizing users who access certain content. Governments may both define what to block and implement the technological process of blocking, or they may create legislation, extra-legal incentives, or policy to compel “autonomous” technological firms to carry out the blocking and surveillance for them.  Often the most simple strategy is to demand the removal of websites with illegal content.

Even within the technical domain, Internet censorship refers to a plethora of tools and strategies to prevent information from reaching users. So it is important to remember that when we refer to “internet censorship” we are not referring to one thing, one software, one point of blockage. Censorship can occur at one point on the internet circuit, can manifest as a blanket filter for all connections in a given country or can be micro-focused on individual sites, machines, and even words.

WEF, WHO & UN All Targeting Your Speech – and YOU!

The World Economic Forum has announced that “misinformation” is the NUMBER ONE threat to the world, but what they really mean is that truth is the top threat to their evil agenda, explains journalist Alex Newman on this episode of In Focus with OAN’s Alison Steinberg.

Along with its “strategic partners” at the United Nations and the World Health Organization, these globalist organizations are targeting free speech as well as control over your healthcare, Alex explains. The government’s dominance over healthcare is critical to controlling every other area of life.

Digital Kill Switches: How Tyrannical Governments Stifle Political Dissent

Communications kill switches have become tyrannical tools of domination and oppression to stifle political dissent, shut down resistance, forestall election losses, reinforce military coups, and keep the populace isolated, disconnected and in the dark, literally and figuratively.

Digital authoritarianism, as the Center for Strategic and International Studies cautions, involves the use of information technology to surveil, repress, and manipulate the populace, endangering human rights and civil liberties, and co-opting and corrupting the foundational principles of democratic and open societies, “including freedom of movement, the right to speak freely and express political dissent, and the right to personal privacy, online and off.”

This particular kill switch can be traced back to the Communications Act of 1934. Signed into law by President Franklin D. Roosevelt, the Act empowers the president to suspend wireless radio and phone services “if he deems it necessary in the interest of national security or defense” during a time of “war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States.”

In closing, we can see things have gotten out of control with our country’s federal government. Our text messages as well as our phone and banking records are now under heavy surveillance. Censorship is conducted daily. Tyranny is upon us, folks!

And even our own state government, including our Arkansas Governor, Sarah Huckabee Sanders, has turned against our right to inquire by denying us complete access to government meetings and records. The Freedom of Information Act is under threat here in Arkansas! Forget transparency, our governor insists upon more secrecy, and especially when it comes to her travel records. She is continually looking for many more exemptions of our FOIA, too. Sadly, this RINO governor wants to eliminate the ability to hold our government accountable. 

So, don’t forget!

We are still in a battle to get the transparency amendment approved and on the ballot for November 2024. Attorney General Tim Griffin is doing everything he can to keep this from happening!

State legislatures need to band together and pass protective legislation regarding intrusive surveillance and improper censoring of our First Amendment Rights (free speech) while they still can, before totalitarianism takes over our government completely.  One thing that the legislators could do is to create and pass legislation that will fine any open carrier, FaceBook, Instagram or X (formerly Twitter) operations that censors free speech being sent over their platforms. The Attorney General of your state may have to get involved because it deals with things at the federal level.

It’s our duty to beat back government overreach!

And our country needs to repent. Our cup runneth over…

2 Chronicles 7:14 KJV “if my people, which are called by my name, shall humble themselves, and pray, and seek my face, and turn from their wicked ways; then will I hear from heaven, and will forgive their sin, and will heal their land.”

As always, our articles may be viewed on our website at  SecureArkansas.com. Once there, you may:

  • view current articles on the main page;
  • view older articles by clicking “Posts & Articles” at the top left of the main page and scrolling down.
  • view additional past articles by clicking the “Next Page” button at the bottom right.

To find information about a topic, just type it into the Search box on our website, and click Enter!

Click here if you’d like to sign up to receive Secure Arkansas email alerts.

stop fluoride

Securing the blessings of liberty,

Secure Arkansas
securetherepublic.com/arkansas
[email protected]


Disclaimer:

Legal Advice is Not Provided

The material in our emails/alerts and on our websites is only intended to provide general information and comment to the public. We make an effort to ensure that the information found in our emails/alerts and on our websites is accurate and timely, but we can’t and don’t guarantee that. Nor do we guarantee the accuracy or timeliness of any information contained on websites to which our websites or emails provide links.

Information found in our emails/alerts and on our websites should not be taken as legal advice. Legal matters can be complicated. For assistance with a specific legal problem or question, please contact a knowledgeable lawyer for assistance.

 



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 1 comment
    • truck driver

      Those Foreign people that claim to be doing security work Hacking from a convenient store table’s or restaurant WiFi, they say they’re Homeland, Their Security, Their international, their world federal police, they always stand in front of the cashier pretending to be talking and Hustle everyone that walks in the truck stop like they’re trying to pick Pocket.

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.