Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Vanquish Your SHADOW break free in 96 hours

% of readers think this story is Fact. Add your two cents.


In 2007 myself and a couple of friends started a company called Yndigo.

The goal of the company was to service the video content delivery industry with bandwidth saving and archival video collection transcription and format future proofing. Basically to take existing video libraries and archive them in a far line, mid line, near line automated distribution channel. The software developed for this project allowed for predictive adaptive content relocation on the web to feed trending and viral content from nearest servers.

This attracted several foreign entities when I left the company I assisted a company in Egypt called SUBKA to implement the streaming and some of my content code. This attracted attention in the affluent region of North West Frontier Provence Pakistan. Joining a group in country I became the Chief Research and Development Officer of Frontier Telecom PK.

During my tenure we developed systems for the distribution of content and provided VOIP and long distance services Globally. It was during this time that I became directly aware that conversations and data communication was intercepted.

My partners in the company have some very HIGH ranking relatives in PK government and many of our clients were US assets in country. One project we developed was a trunking system that bypassed normal internet protocols and produced physically secure data streams. Because of this the PK concerns requested our service.

The nature of the phone network globally is intentionally insecure licensing in countries requires access for local authorities.This access is granted by use of physical hardware inside of encrypted links that allow the authorities open access to network packet data. Ever since the advent of ISDN all phone calls transmitted by common carrier networks have been digitized the formats are mostly public. 

The communication protocols are split into a couple of groups but inBand signaling is now most common. This protocol forms a virtual D channel link of 8Kb to provide connectivity across all forms of interconnect. Typical D channel communication data content includes Cell Tower location, Signal Strength, Subscriber identity IEMI and SIM authentication. For land lines the POTS port at the phone provider does this or more common today the VOIP terminal provides this.

Once a channel is open the D channel contains the packet identifiers for the various B channel communication. GSM GPRS VHF LTE 5G are protocols that use differing numbers of B channels to produce greater aggregate bandwidth. Your voice is converted to a RDP stream of packets your TCP data is just that. The packet identifiers are sometimes streamed in-band on B channels to gain bandwidth. BUT ALL COMMUNICATION IS REDUCED TO PACKETS.

As a provider I have the right to capture these packets for Quality Assurance. The voice takes up the least amount of space the videos and compressed content the most. The most popular operating systems are very loose with packet data and often sacrifice security by only encrypting the headers of the packets not the datagram payload. Consumer level encryption uses about 40% overhead so most data is sent unencrypted with schemes to randomize packets or DRM protect final use. 

This means that with 48 characters of code I can compare a sample RDP packet group of your voice and determine it’s presence in a group of 16,000 channels in 143 ms. Iteration of the group allows me to identify the source and destination of those packets and decrypt the content regardless of your protection scheme. This data provides META that includes location device your SSL keys and preferred formats.

Injection takes place anywhere in the internet as long as the headers designate the correct origin and destination they will route to your device and I an open channel through any  router between you and I to listen for your packets and receive them. SO you can see that all of the VPN password and other schemes miss the point. So securing your data is just a sales gimmick for software that actually will not work.

Now you look at the issue from 10,000 feet it is not network security that is important it is the content security that is possible. The SHADOW concept is that if I collect data on your habits and correlate that data with private and public record I can produce a statistical model of your likely activity. This model is than iterated with various stimuli to produce effect clouds that are refined to determine the most likely cause of a desired effect. The recent improvements are that the SHADOW person adapts faster to your actual responses.

The largest weight of the data collected for this is your internet activity and your location and interaction activity. Randomizing your activity will lessen the validity of your shadow. There are ways to do this with software triggering hundreds of search and website visits along with posts and other indicators of human activity. These are considered HACKING by law but should not be in my opinion. Your location data is simple to invalidate shield your mobile devices or leave them behind for extended periods. The cost of maintaining your shadow is directly in conflict with the profit of the system and old records will fade in value as they age. The most relevant datais about 72 hours or newer. 

Get some walky talkies if you have need of constant communication with friends or family. Radio Signals interception got defunded every year for many. So most locations are unmonitored. Some radios even have text functionality.

Push to talk radios some use cell some are VHF the VHF are most likely unmonitored.

The idea is to pause the data collection long enough to rerank your shadow

Personal randomization also works look up crap you see at traffic lights or run license tag numbers or any other HUMAN random activity to skew your model.

One highly effective thing to do is leave your phone in the car when shopping the messages will be there when you get out but the contact and proximity data will be invalid.

Use other peoples phones to check websites and social media the cookie trail will damage both of your models.

Unfortunately it is illegal in the USA to use methodologies that secure your communications completely. However as a point of education the datagrams of the packets can be encrypted using a preshared key in the form of a Tally Stick the notches of one must match the notches of the other to d ecode. The WW2 German encryption has a pair of boxes that contain an assortment of preshared keys the keys rotate at predetermined intervals Another technique is to embed address locations in image files using stegonography the image file is them streamed as a video on an multicast server. Both parties tune in to the stream and use the address records to make packet requests and answers to open routing between devices. This randomization works and has been used in combat. Peer to peer Torrents can be used like a Cutout book to provide secure communications the scheme is simular to making a mask that select words show through the packet reassembly can produce JPEG images of textual information and voice can be encoded as image and played back realtime. The image is transmitted as a jpeg and the receiver reads the image with his software.

 



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.