It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

A Journey into the Eye of the Pyramid

page: 1
4

log in

join
share:

posted on Jun, 23 2010 @ 02:06 AM
link   
June 23, 2010 (SJR)– The Total Information Awareness (TIA) database provides god like powers to those who can access its files. Government intel software combs these files, sorts the mountains of data, and builds profiles for every man, woman, and child ever snooped on by this cyber monster.

Who feeds this monster all the raw data on our lives? We do every time we interact with or in the presence of our modern electronic toys, gadgets, and devices.

#1. CELL PHONE. On or off, you phone's microphone is hot. Everything it picks up is compressed and reported to the TIA database using periodic signal burst. New cell phones that have imbedded cameras can also report a stream of snap shot video back in the same manor. ONLY DEFENSE: pull the battery out.

#2. DESKTOP COMPUTER. Back in the 1980's, worldwide intelligence agencies were freaked out by the encryption power of the simple desktop computer. To counter this threat, a power supply back door was developed to permit intelligence agencies to sneak into any computer via the a/c power grid and access the operation system and system data. This is the ultimate back door that works wether the computer is connected to the internet or not. ONLY DEFENSE: Operate stand alone systems from back up power supplies that are in no way connected to the power grid. Generators and clean sign wave inverters can defeat this snoop. However, every computer connected to the internet in any manor is compromised by other network back doors embedded in the operating systems for the benefit of the TIA database.

#3. TELECOMMUNICATIONS. It has been documented for years, in many sources, that the TIA database collects info from the telecommunication networks. It’s safe to assume that every word you utter, every email you send, every website you visit, every picture your cell phone records, is all copied and stored in the TIA database. ONLY DEFENSE: If you are within twenty feet of any modern electronic device, assume that 100% of your utterances and actions will be recorded and copied to the TIA database. Also, assume that every hotel room, public space, and even street corners, are bugged and surveyed by hidden microphones and cameras.

#4. TELEVISION. It has been presumed that modern digital televisions have embedded micro-cameras and microphones, that feed snapshots and sound data to the TIA via the power-grid. ONLY DEFENSE: Unplug such devices for privacy, and assume that when they are plugged in that they are snooping on you, wether or not the device is turned on.


Now, there are those that would argue that we need such government snooping to keep us safe from terrorists. Such an argument is beyond the scope of this article, but not all snooping is done by the government. And, it would be prudent to presume that monied interests could “buy” access to the TIA database to gain unknown “inside” information to trade financial markets. Or, consider the ability to gain "sensitive private data" that could be used for political blackmail of legislators to control public policy.

Of a more personal concern, you should wonder if it even possible to have some privacy in a public bathroom? For years now, strangers have been known to snoop inside of stalls with hidden phone cameras. Such creeps can post your most private moments on underground porn sites without your knowledge or consent. Many ladies know all about these dangers, but for the men reading this article, when was the last time you looked over your shoulder while standing at a public urinal?

READER'S BEWARE: The disclosure of this information is bound to spook the intel agencies that rely on the TIA stream of electronic data, so beware of disinfo agents bashing this article or the concepts that it conveys.


(c) Copyright 2010 SJR - Copied to and posted on ATS by the author.


[edit on 23-6-2010 by Gold_Bug]




posted on Jun, 23 2010 @ 02:29 AM
link   
Interesting. Where is your source?

Of course I have heard this before and I think electronics experts who work with and repair this stuff will tell you it's mostly untrue.

Take the digital tv for instance.. if this were true everyone would know it because someone would have found the camera by now.

How about the PC power supply.. How is data going to get from your pc through the ac outlet, when there is no data feed connected to the power supply?



posted on Jun, 23 2010 @ 02:36 AM
link   
reply to post by Gold_Bug
 


Do you have any sources for this information? How did you come about this info?

Also, you seem to be forgetting those grocery store shopper discount cards. Every time you shop at the grocery store and swipe that card to get the advertised price, all of the information about your purchases and payment method is going into a database somewhere. Whether or not the government has access to this data, I have no idea but I don't see why they wouldn't.

--airspoon



posted on Jun, 23 2010 @ 02:48 AM
link   

Originally posted by JohnPhoenix
Interesting. Where is your source?

My source is from my own personal life experiences. Back in the early 1980's, I learned about some of this while building hardware circuits at Bell Labs. At that time, I also was friends with an old man who work for Battelle, in Columbus, Ohio. It was this man who taught me how to use an oscilloscope to view modulated data on a line.

The computer power supply deliver's DC power, via many individual wires, to the motherboard. Modulation circuits on the motherboard, fed by the operating system, provides a serial link through one or more of those DC power feeds to the power supply. Then inside the power supply itself, repeater circuits convert the modulation into a form that can be carried back out along the AC lines into the grid itself.

The only way to detect this is using an oscilloscope, and the data appears as "line noise".



posted on Jun, 23 2010 @ 02:51 AM
link   
I don't understand how data can travel on an electrical line charged with 110 volts of electricity and then when it get on the grid were dealing with thousands of volts? Can someone explain how this is possible if at all? Seems to me if the data could even travel on the line there would be way to much noise to get an kind of viable signal.

Also if the above is even possible there would have to be routers and nodes to direct this data to government servers. Also if they are saving ever conversation, photo, fart, etc. of every person on the planet that is a hell of a lot of data to sift through and even though software might sort it and flag key words or phrases some body then has to read it it or view it etc. I don't believe they have the man power to anywhere near cover a fraction of it. Which really would make it impractical

Still I am not convinced yet this is even possible and I have worked on computer networks for 25 years. I am open but need some hard evidence.



posted on Jun, 23 2010 @ 02:57 AM
link   

Originally posted by Gold_Bug

Originally posted by JohnPhoenix
Interesting. Where is your source?

My source is from my own personal life experiences. Back in the early 1980's, I learned about some of this while building hardware circuits at Bell Labs. At that time, I also was friends with an old man who work for Battelle, in Columbus, Ohio. It was this man who taught me how to use an oscilloscope to view modulated data on a line.

The computer power supply deliver's DC power, via many individual wires, to the motherboard. Modulation circuits on the motherboard, fed by the operating system, provides a serial link through one or more of those DC power feeds to the power supply. Then inside the power supply itself, repeater circuits convert the modulation into a form that can be carried back out along the AC lines into the grid itself.

The only way to detect this is using an oscilloscope, and the data appears as "line noise".


So.. let me get this straight.. Every power supply company builds these "repeater circuits that convert the modulation" into their power supply knowingly and willingly?

That's kinda far fetched.. Every electronics company on earth would have to be in on the jig.



[edit on 23-6-2010 by JohnPhoenix]



posted on Jun, 23 2010 @ 03:06 AM
link   

Originally posted by airspoon
reply to post by Gold_Bug
 


Also, you seem to be forgetting those grocery store shopper discount cards. Every time you shop at the grocery store and swipe that card to get the advertised price, all of the information about your purchases and payment method is going into a database somewhere. Whether or not the government has access to this data, I have no idea but I don't see why they wouldn't.

--airspoon



At the grocery store you are "in a public place". You are captured by surveillance video, and god knows what else. Everything you do, including everything you purchase, can safely be assumed to be recorded by the TIA database.

Real life experience: My home in the country uses well water. One day a few years ago, the water coming out of the faucet smelled like rotten eggs. This means that bacteria had found its way down into the well. The fix, involved "shocking" the well. This means that you need to pour a solution of bleach and water down the well hole & flush it through the system to kill the invading bacteria.

THEREFORE, I drove down to the local grocery store one Saturday morning and purchased just 2 bottles of bleach and nothing else. I used my store card to get the discount, then drove home. Less than 30 minutes later, while standing out in the yard next to the well the following events took place:

A black helicopter flew overhead and circled, while a strange man (presumed to be an undercover peace officer) drove in my driveway and started asking me weird questions. When it became obvious to them, why I had purchased the bleach, the man and the black helicopter left.

This single event told me that the grocery stores computer system is HOT-WIRED into the TIA and my purchase tripped a BIG RED FLAG that was followed up on by law enforcement.

Given my very outward views and blogging, I'm sure that I'm high on the govt's watch list.



posted on Jun, 23 2010 @ 03:41 AM
link   

Originally posted by JohnPhoenix

That's kinda far fetched.. Every electronics company on earth would have to be in on the jig.


There are tens of thousand of electronics companies on earth. How many of them do you honestly think participated in the circuit board and embedded software driver designs?

IMO, it would only take a handful of key "in the know" people, who are under government non-disclosure agreements to implement this technology with no one else the wiser.

FYI, a few key people most likely installed "software" backdoors into the avionics packages of commercial airliners. These backdoors allow radio-control remote takeover of such flights, for all kinds of public safety reasons. There are many problems with the public discovering this fact, including, but not limited to, the 911 false-flag, and public flying fears. I've even read foreign MSM articles on the net before they were deleted, which claimed that Germany discovered this fact long ago, and then ripped out such packages and installed their own.

IN TODAY'S TECH SOCIETY: The safe presumption when it comes to electronic snooping is, if it was possible to do, then it was likely was done.

INFORMATION IS POWER- An the most powerful information is that which your opponent does not know that you possess.


DISCLAIMER: The original article in this thread and the following represent a viewpoint derived from my unique life experiences. As such, each reader can chose to accept or reject the information as they see fit. I can offer no “proof” or other evidence of this information due to the manor in which I acquired it.



posted on Jun, 23 2010 @ 05:00 AM
link   

Originally posted by Gold_Bug
#1. CELL PHONE. On or off, you phone's microphone is hot. Everything it picks up is compressed and reported to the TIA database using periodic signal burst. New cell phones that have imbedded cameras can also report a stream of snap shot video back in the same manor. ONLY DEFENSE: pull the battery out.


This is true, as far as audio, but not video. Very simple technology in use by the various alphabet agencies.



#2. DESKTOP COMPUTER...a power supply back door was developed to permit intelligence agencies to sneak into any computer via the a/c power grid and access the operation system and system data.


Pure paranoia. I've built and repaired power supplies and computers, as well as numerous other electronic circuits for a living. PS components and data components are completely different and distinct. It's impossible to carry data through your power supply. There is NOTHING in a computer or power supply capable of converting and transmitting data - NOTHING.



#3. TELECOMMUNICATIONS. It has been documented for years, in many sources, that the TIA database collects info from the telecommunication networks...Also, assume that every hotel room, public space, and even street corners, are bugged and surveyed by hidden microphones and cameras.


True, telecommunications of all kinds are easy for the government to tap, so always assume you're being watched on the Internet, listened to on your phone, and watched in public.



#4. TELEVISION. It has been presumed that modern digital televisions have embedded micro-cameras and microphones, that feed snapshots and sound data to the TIA via the power-grid.


More paranoia. I've seen the circuit boards and I know every last component on them and what they do. The only mystery is what some of the individual chips do, however there are "Data Books" for the purpose of looking them up by number and finding out. TV repair people have these books and all of them would know if something nefarious were happening.



Of a more personal concern, you should wonder if it even possible to have some privacy in a public bathroom? For years now, strangers have been known to snoop inside of stalls with hidden phone cameras. Such creeps can post your most private moments on underground porn sites without your knowledge or consent. Many ladies know all about these dangers, but for the men reading this article, when was the last time you looked over your shoulder while standing at a public urinal?


True, but compared to all the other crap we have to worry about, this doesn't concern me, as you just need to be aware of your surroundings.



READER'S BEWARE: The disclosure of this information is bound to spook the intel agencies that rely on the TIA stream of electronic data, so beware of disinfo agents bashing this article or the concepts that it conveys.


Not everyone who disagrees is a disinfo agent.



There are tens of thousand of electronics companies on earth. How many of them do you honestly think participated in the circuit board and embedded software driver designs?


The bare circuit boards, components, and software are all manufactured by different companies and assembled by yet another company (at least 99% of the time this is the case). And in order to create a spying power supply or TV, all of these things need to be designed to work together. Therefore all of these companies would know what's going on.



(c) Copyright 2010 SJR -


You're kidding, right?



posted on Jun, 23 2010 @ 01:32 PM
link   
Regardless just be aware of the possibilities. Know you are being watched and don't assume you aren't if you have something sensitive in nature to talk about.

While these things cant be held against you in court, doesn't mean it wont be used in another way or the law won't change in the future.



posted on Jun, 23 2010 @ 04:44 PM
link   
Braodband through electricity cables. comon knowledege here to links. goolge more if u r interested...
inter and intra... np...


www.wired.com...



newsgroups.derkeiler.com...



posted on Jun, 23 2010 @ 06:26 PM
link   

Originally posted by Gold_Bug


#2. DESKTOP COMPUTER. Back in the 1980's, worldwide intelligence agencies were freaked out by the encryption power of the simple desktop computer. To counter this threat, a power supply back door was developed to permit intelligence agencies to sneak into any computer via the a/c power grid and access the operation system and system data. This is the ultimate back door that works wether the computer is connected to the internet or not. ONLY DEFENSE: Operate stand alone systems from back up power supplies that are in no way connected to the power grid. Generators and clean sign wave inverters can defeat this snoop. However, every computer connected to the internet in any manor is compromised by other network back doors embedded in the operating systems for the benefit of the TIA database.




[edit on 23-6-2010 by Gold_Bug]


Or use a lap top on battery power.
You claim your sources are a personal experience but I'll be honest with you. I am very sceptical here.



posted on Jun, 23 2010 @ 06:44 PM
link   
About data travelling electrical wires- Years ago there were tv commercials for a telephone jack that plugged into the electrical sockets so you could have a telephone anywhere in your home.

Is this similar?



posted on Jun, 24 2010 @ 05:50 AM
link   
reply to post by dlifesjrny
 


That's true, but the data in that case only travels on the power lines on the same circuit within your home, which is tied into your phone line through their device. They could POSSIBLY install one of those devices just outside your house to eavesdrop, but with the technology they have available, there's no need to resort to such primitive means. If you have a phone, wireless or not, connected to the power line or not, the government can eavesdrop at will.



posted on Jun, 24 2010 @ 03:20 PM
link   
reply to post by AntiNWO
 


Don't you realize how easy it would be for them to add small bits of firmware into component packages that could help set up backdoors or related breach enablers?

Not hard at all.

Tech would have to basically be deliberately trying to detect such signals, and be skilled enough to find them. The circuits might not even be active until activation, meaning unless you knew how to activate these things you wouldn't be able to find them.

Although I'd be quite highly skeptical they'd be able transmit broadband thru PSU circuits, but they could use this as an initial breach point. Then there's the possibility they have super advanced hardware able to snoop thru the circuits and into your promised land. Ask yourself if 20 years from now you'd expect such hardware to exist?

Consider this:

A powerful set of tools specifically designed to circumvent security on computers running the Microsoft Windows operating systems was released to law enforcement and military intelligence staff in the U.S and other foreign countries by Microsoft in the summer of 2007.

The USB device was dubbed COFEE which stands for Computer Online Forensic Evidence Extractor. COFEE is said to contain over 100 software programs that allow the holder to quickly discover passwords, decrypt files and folders, view recent Internet activity and a great deal more. On piece of functionality allows evidence to be gathered while the computer is still connected to the Internet or other network. All you have to do is plug COFEE into a USB port of a running computer and the data extraction begins with the click of a mouse. Some security professionals and privacy advocates are concerned that Microsoft has created a secret back door within Windows. This is a concern the Microsoft has denied.
ignoranceisfutile.wordpress.com...


And that's the 'public' version.

About all the manufacturers and so on, consider that most chips are built in totalitarian places like China & Singapore, and are designed by NWO nations such as the US & Japan.

Another thing to consider is that broadband scale transmission rates are achieved via USB, which uses only 2 (tiny) data lines:
pinouts.ws...


Originally posted by AntiNWO

Originally posted by Gold_Bug
#1. CELL PHONE. On or off, you phone's microphone is hot. Everything it picks up is compressed and reported to the TIA database using periodic signal burst. New cell phones that have imbedded cameras can also report a stream of snap shot video back in the same manor. ONLY DEFENSE: pull the battery out.


This is true, as far as audio, but not video. Very simple technology in use by the various alphabet agencies.


Says who? Why would they be able to snoop the audio but not the imagery?

That doesn't make sense.

It's not like they lack the bandwidth...

In the United States, in 2009 actions were taken by the telecommunication industry that led many to believe that price fixing was taking place. Every provider (AT&T, Verizon, Sprint, and T-Mobile) all offered the same mobile broadband plan at the same price. 5GB max at $60 a month. Under the Sherman Act,[1] July 2, 1890 this would be illegal, and allows for any individual the right to sue under the antitrust laws. As evident in the network outage on April 9, 2009 in Santa Clara, Santa Cruz, and San Benito counties in California many of these companies are interlinked and some share the same network (depending on area), which might constitute monopoly or cartel practices.
en.wikipedia.org...


[edit on 24-6-2010 by IgnoranceIsntBlisss]




top topics



 
4

log in

join