Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

The Cell Phone Trap They Know Who and Where You Are.

% of readers think this story is Fact. Add your two cents.


I have experience in circumventing foreign government control over communications.

As VOIP became prolific almost all customers wanted cheap international calls.

The phone systems of the world use the long distance fees to help pay for infrastructure in these countries bypassing incoming phone calls to avoid tariff is illegal.
But I would estimate that 70-90% of major carrier phone routing is done over these illegal black routes. 

There are also grey routes where a company buys a block of long distance into a particular exchange for a set price to use for the companies calls. On a grey route the tax is paid but the unused portion of time is sold externally and it most countries this too is illegal but harder to prove.

So the companies who make the bypass hardware found a new legitimate market in selling bypass detection systems. At the same time they sell lists of do not call and enforcement incoming numbers to the bypass industry. It is a big scam all around.

Because of the expense of hardware for the newest SIM card authentications most foreign cell systems use older generation sim cards. The cards are easy to copy and SIM banks of 256 cards can be configured outside of the country and IEMI number radio banks in country to link VOIP to cell towers. In the USA the carriers are required to associate a credit card or government ID with the IEMI number and the SIM card. This is why you have to go in some cell providers office to validate a new SIM card. Topping off can be done in cash but ID is required at least once.

There is already a direct tracking method for all cell phone users in north america.
The idea of a burner phone like TrackPhone is false you still need to activate the phone.
If you go to a Best Buy or Walmart and buy a half dozen with cash you are red flagged and will be under surveillance before you get to the front door. If they can not absolutely identify you then you will be stopped and possibly arrested for terrorist activity. If you have walked out with the phones the IEMI numbers of the phones are tagged and FBI/DHS will be collecting all data. Same goes for cash sim cards. Law enforcement waist huge amounts of money on this. In areas where the agency staff to follow up on, sales is limited the phones are not in stock.

So basically if you have cell service they know who you are and your location already.

If you have a routine that shows your location at home then away for 6-8 hours they assume that is your workplace. 5-6 pm if you are around a group of others they assume that is your casual social group. 5-10 PM your intimate group and so on. It is all based on assumptions of typical behaviour these are increased in validity by credit card purchases and transport routes. The whole idea is that people are habitual and bad habit routines are predictable.

So for instance is you leave your cell home while you are working they assume you lost your job. If you are married and your phone is at a single residence or married with out the other spouse they assume you are unfaithful. If you take a day off from work and vist another business they assume you are job hunting. They are looking for granularity.

In an example I had a personal workshop and development lab for ten years. I would often spend all night working on something or another. They assumed I was sleeping there and local fire marshal was alerted to check. Since I was non-commercial and not in residence at the location the fire marshal had NO Authority. The location was not vacant or occupied it was unoccupied and they have no authority. I settled the dispute by informing his boss that I would be suing each of them individually for harassment and gave them a document with case law for their attorneys to review. They abandoned their quest.

But it pointed out the nature of the issue DHS had been alerted to prior contracts that I had for fulfillment of sensitive materials. This placed my name and that address on a list. As TSA and DHS was rolled out the FBI gave several lists to TSA, my name was on it as a trusted person vs a suspect. The welfare to work nature of the DHS and TSA meant that individuals unable to know the difference placed all list names in same category. “You be on a list” Years later the bell curve at the DHS has bottomed out and ms “You be on the list” is a supervisor looking to redeem herself for prior folly. She is who called the fire marshal.

The phone tracking is real and the people watching it are clueless, hence extreme danger.

Another aspect of cell service is that call quality checks are unrestricted and agreed to by the subscribers. This means I can do short D-Channel audio checks without ringing your phone. Just turn the microphone on and capture RDP packets. So technically I am not listening to a phone call just checking the line. In 2015 I pulled a contract to create a voicemail audio detection algorithm they needed to identify a specific voice pattern on 16,000 phone lines. The work product ended up being 148 characters of machine code. The time to verify presence on 16,000 channels was 143ms. This is repeated on interactively smaller segments ending in the lines that have the specific prompt. 

SO I can sequence a line quality check in a given exchange 800 555 xxxx capture 30seconds of RDP traffic. Then run the program using a sample of RDP from a known identity voice call and determine what lines have a match. This lets me look at the Call Data Record (Meta) and determine proximity and GPS of each phone that heard your voice. For that datablock it takes about 3 seconds to return a triangulation. It is good for @70 foot away and the more channels the more accurate. In a bar for instance 2-3 inches.

All this crap about META data , The NSA actually have a historic file of the RDP packets from every phone in North America that is searchable as described. Not your analog or digital recording but the packet traffic that the phones use to simulate your voice, remember it is all VOIP. Since about 2003 that data is continuously collected.

Now for even more crap every Competitive Local Exchange Carrier provider has been required by licensing to install hardware that enables unsupervised access to all of the data on the licensed network. Most of the guys with CLEC are primarily supporting phone rooms ( call centers). The personnel of a cal center is usually referred to as Gen Pop because of the number of nefarious people trying to go straight by getting those jobs. These people are also preyed upon by certification salesmen offering MSCNE and Cisco training. So what ends up happening is that the Spy hardware gets put on the same network that contains all of the other databases. So the call center buys a package of data from a credit score company and another from turbo tax and another from Visa-Mastercard and correlates the data to produce leads for his staff to sell financial products. This data gets included in the phone data collected by DHS.

Your ISP also sells data to the agencies and private intelligence vendors as to your web traffic and email content. All this data gets correlated to produce a virtual you by both the agencies and the data farm companies like Google. This virtual you sets out to predict your action based on trends.
If they see red flags they focus on you if the see conformity they move to another tactic instantiation. The server cost for this virtual you has to produce income to maintain commercial validity. If they can not predict then they purge your record. Un predictability is key in maintaining your freedom.

Instantiation many people believe that Amazon or Google has read their minds because they seem to know what you want to buy before you do. BullShift what you are experiencing is subliminal instantiation. Cues are given you over a period of time that create a concept in your mind. Then reinforcement is given you for a while, then a trigger and they present the plant, and you believe you just thought of it. You didn’t, you have become the perfect consumer.

So how do you defeat the trap?

  1.  Don’t take your phone everywhere you go whenever you go, leave it on charge. Breaking up the pattern is important.
  2.  If you are visting friends leave it in the car. The audio can be monitored.
  3.  Dont publish your whole life on social media get a website and be free. There are simple tools online to make favicons for your sight these can be saved as an app on your device.
  4.  Get yourself a small linux embedded board like a BeagleBone Black or Rasberry Pi or NanoPi Neo2 and install a DNS server for your local network lots HOWTOs online for this. Many people think that a VPN will provide privacy it will not. A real VPN between friends can provide more privacy but the VPN connections do not actually prevent me or your ISP from grabbing all of your traffic.
  5.  Team up with your friends products like OpenVPN allow you to create virtual local networks to chat and do all the same stuff you do on Facebook or Twitter.
  6.  Scramble your searches in Linux there is a program called Wordnet learn about it and automate your own scrambler. When you search for “Blue” search for Green and Red soon after if you search for Antarctica search for Alaska. This throws off the predictive element of big datas model of you. The less reliable the model the more expensive it is for them to support it.
  7. Mess with them, visit a Mosque, a Temple and a Church on the same day. If you intend to buy a Chevy look online at fords. If you need to bring your phone to work drive a different exit every day. Mix it up, Make yourself unpredictable.

If things get even more wonky we will need to start using mass proxies. These are physical proxies and not technology per se. All of us know at least one person that has fallen on hard times. These people become invisible to the system. They are a great asset. Talk with your associate and if the person can understand instructions have them make a purchase of a track phone, Net Spend Card and Internet data. Pay them for the proxy and arrange others to do the same helps everyone and provides anonymous coms. Keep these devices away from your regular phone and get a Faraday bag to block them. The idea is to use them to make quick texts and call drops to your friends regular devices. Your friends then unbag and call you on their burner devices.

Never call from home.



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.