Month: March 2017

What Information Can be Found With a Phone Number

When you consider connecting the dots to create a picture, imagine your phone number as the dot that connects everything else they know about you.  Even if they have it all, it is up to you whether or not they have the dot with your phone number to complete the picture.phone hacker

All it takes to find everything is to just find that phone number connected to one of the many things we already know like your facebook account (which requires a phone number) or any shopping card from a corporate retailer you may have given your number to.  Do you still believe those corporations don’t sell or trade your private information?  Well even if you do, it doesn’t matter because they are all systematically hacked a bare minimum of every 3-5 years.

Any email you get for free is being picked off as we speak.  It doesn’t matter if you gave the provider any phone information or not.  All you have to do is reveal your phone number in the text of an email and boom!! Mission accomplished!!  Free emails mine everything that comes across your screen, including drafts.  Why do you think they always want you to “secure” your email account with a phone number?

If you have connected to an old friend or new business acquaintance by email or social media and given them your phone number in a message it is connecting you to that phone number and that media account.

It’s called the world wide WEB for a reason.  Everything you do is sucked into a giant computer and maintained for profit and micromanagement of the public.  A good researcher can take an unknown phone number and use cell towers to “pair” it with other devices already known to be in your name.  For example: a burner phone (see our article on burner phones https://privacyliving.com/2016/05/17/what-is-a-burner-phone-how-can-it-help-me/ ) can have its owner pegged pretty efficiently when it is continually detected near the same owner’s normal cell phone or other smart device.  This can include cars with smart devices embedded in them.  By detecting an unknown phone continually traveling to the same places and staying at the same address all night along with already known devices it is easy to deduce that you are the owner.

As you can see, being truly anonymous requires some serious work but it is possible.  You can always pick up a copy of “Disappear in 24 Hours” by Lonn E Wolfenstein if you want to do a total makeover.  The book is available at Brave New Books in Austin TX or can be ordered by clicking the products link at the top of this page.

Advertisements

Privacy is officially no longer safe around modern technologies such as smart phones, smart TVs and the like. This is something that we always kind of knew, but it’s now been confirmed in the latest Wikileak.

Via the WikiLeaks press release (courtesy of Naturalnews.com):

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones

Read more: http://www.naturalnews.com/2017-03-07-vault-7-bombshell-just-vindicated-every-conspiracy-theorist-the-cia-can-spy-on-anyone-through-tvs-iphones-smart-phones-and-windows-pcs.htmlcia hacking code phone

Body Cams Give Cops The Power To Google Everything They See

Scary new technology gives those using body cameras power to google things and so much more. When body camera meets artificial intelligence technology, scary things happen.

Last week, Taser, the stun gun company that has recently become an industry leader in body-mounted cameras, announced the creation of its own in-house artificial intelligence division. The new unit will utilize the company’s acquisition of two AI-focused firms: Dextro, a New York-based computer vision startup, and Misfit, another computer vision company previously owned by the watch manufacturer Fossil. Taser says the newly formed division will develop AI-powered tech specifically aimed at law enforcement, using automation and machine learning algorithms to let cops search for people and objects in video footage captured by on-body camera systems. – Vocativ.com

http://www.vocativ.com/402771/ai-body-cams-cops-google/

body cam cops

Hide Your Cash When Traveling

Today I ran across this excellent video https://www.youtube.com/watch?v=is7KetXtJIQ
If you are considering a trip to a rough area, which unfortunately includes areas of the USA, you need to watch this.  The guy includes some very simple places to hide your cash from predators.  In many areas around the globe, our contributors have informed us that official corruption is still alive and well.  This means you may actually be hiding your travel money from somebody wearing a uniform or a business suit.  There are all sorts of predators out there, so get prepared.
hide-the-money