Complete Guide to Government Surveillance and Technology 2012
As Experienced On My Own Skin
by Rory Smith
I will break this down into clear sections so you have no trouble understanding. Please use and share, no limits.
Little about me:
I am just an average person living in Canada, I happened to come across information on 9/11 being inside job on the internet, I thought it must be a
lie until I verified the evidence myself. I started talking openly online about 9/11 as well as other government programs such as so called “chem
trail” program among others. I also started talking openly about Private Central Banking of western nations which is a system of perpetual debt. Etc
I never participated in street demonstrations of any kind, I am simply an average person who has time to read the mainstream news and alternative news
and ask questions. This got me on government surveillance list, as you can see, it really doesn’t take much.
4 year surveillance:
I had no idea I was under surveillance until I started noticing small things like locked car became unlocked overnight seemingly by itself, certain
house doors would be unlocked even after I locked them earlier. I simply chucked it as “my bad” I must have forgotten to lock them etc. New
neighbor moved in and as I got to know her, she seemed to know a lot about me. All of this seemed suspicious but since I am not a criminal nor rich
nor important man, I didn’t think government agencies would actually be spending money on investigating me. And even if they did, it would be a
quick 1 month project and finished up. Now I know how naive I was on the issue, and just how much I underestimated our beloved government (sarcasm)
Motives for surveillance of citizens is very simple, government agencies know they have innocent blood on their hands, they are fully aware of how
criminal they became and just what kind of punishment they would get if truth was in the open. So they are becoming increasingly paranoid and want to
watch as many citizens as they can in hope of being at least informed on who is the “enemy of the state”. USA State Department currently headed by
Hilary Clinton, likes to hide behind 169.254.#.# IP addresses, you can use foreign IP analysis sites to undress them in FULL VIEW. If you use COMODO
security you can see State Department coming in as a New Private Network. See pics at bottom. You gotta hand it to US government, they are smart
hiding behind seemingly legit IP, too bad they use their smarts for evil.
Computer and Internet Surveillance:
First thing government agents will do is go after your computer and cell phone, I found a government Trojan installed on my computer, it was a
professional program called CaseLink as well as few others, it not only is capable of monitoring your activities but also uploading, downloading. Heck
they can even defragment your Hard Drive if they wanted. If your firewalls are too good for their hackers and you are careful what kind of files you
download and use. Government agents will wait for you to exit your home. And they will physically come into your home and install Trojan programs on
PC. Your best bet so far is security programs like COMODO security, you have to run it on most paranoid settings available, in fact your settings have
to be such that every computer action is being prompted to you by COMODO so you can judge what your internal programs are doing, be it Internet
Browser or Office or whatever.
I Caught Government agents using small spy camera:
I bought few small spy cameras for couple hundred bucks in local stores. Placed a few of them in various positions, one night I came home and checked
what the cameras have been recording, only to find 2 cameras missing files as if there was nothing to record (not even me exiting the door) but 1
remaining camera they didn’t disable, it clearly showed two civilian looking men with a bag of tools walk into the front door, camera was recording
front hallway, so I didn’t see exactly what they were doing in other rooms, but it makes sense they were installing or modifying surveillance bugs.
When the two soulless agents exited, they locked the door of my home. Local police took the evidence after I called them, and they said they will look
into it, they never called me back, your local police are just grunts for the spy agencies, they don’t have the Juris-My-Diction
Your Internet Service Provider is like Government Right Hand:
You have to understand one thing, your ISP has already and is giving government agencies all your browsing history, you have to use foreign proxies to
surf the net and you have to change them ever so often, you can google fastest proxies and use them in your browser settings.
Quick fix for your computer Trojan and bug infection:
Format your drives and do a clean install of your programs, then image onto DVD your drives, so you can restore everything in 20-30 minutes, do not
rely on windows restore points, windows is a government back door, details on this further down for those of you techies who love a challenge.
Internal Audio / Video surveillance inside your house:
If government agents entered your home to install a Trojan on your computer, you can bet whatever money you have, they have also installed microphone
and camera bugs in your home. They are now watching you having personal relations, they are watching you do your bathroom business, they are watching
you watch TV, etc. If you got some money and you bring in an expert sweeper, government agents simply shut down the bugs for the duration, so your
expert sweeping for signals finds nothing. You end up paying for service that was useless. Your defense against the home bugging is to move to another
place, but this time make sure you have someone in your home when you are not in, because government agents will simply bug your new home when no one
is inside. I won’t lie to you, unless you got money to pay for a living guard to be in your home when you are out, chances are you won’t be able
to defend your home. Because even if you catch them on camera and microphone of your own(like I did), it is too late, your home is bugged
Government likes to put bugs into your TVs, Radios, lamps etc:
Half the time listening and recording bugs will be in your large TV or your favorite sound system, they like to put it there because it is constantly
plugged into power and when you move you take it with you. If all else fails, their agents will try to bug you through legal installation of new smoke
detector on your ceiling, after they are gone, remove the new smoke detector and put back the old one.
Keys and Locks:
Don’t waste money on elaborate keys and locks, none of this is a problem for government. They got the best tools and they will enter your home
without breaking locks, you can bet on that.
If you live in apartment building:
Even if you are able to guard your apartment 24/7 against unauthorized entry. Government agents will rent an apartment above you or next to you, and
they will use silent drills to drill micro holes in the ceiling and walls to insert surveillance devices. The only defense is to have your own house
and property around it.
Your car without a doubt will be bugged, they will know where you drive, and what kind of conversation is going on inside the car. You can’t really
defend against this unless you park your car in guarded garage, and always have it in your sight when you go somewhere. Government agents are
perfectly capable of bugging your car even on public parking lot. They simply enter in and do the job. In fact when I bought my new car and got rid of
the old one, I found my remote control seemingly malfunction, trunk opening by itself, car locking turning off and on. This lasted briefly, what was
in reality happening is government agents were capturing the signals for remote control while I was using it So that they have the new frequencies to
be able to install bugs into my new car while I am sleeping or away. I don’t know if agents bother going back to my old car, wherever it is, to
remove their bugs.
Be Aware of Gifts and Good fortune:
Once government people know what you are into, they could leave something like laptop computer in excellent condition or a radio in a place where they
know you will find it, sort of like someone left it or forgot it next to your house, you see it as a good deal and take it as yours, you just got
People in your life:
People you know long time you don’t have to worry about, however any new friends you meet at work or in school or whatever, could potentially be
government agents, they can send you a good looking woman, or a guy, or it could be just an ordinary fat person who seemingly is interested in same
things you are, few people that I met that I am 100% sure were government agents, gave themselves up by showing that they know too much of my personal
life. If government sends you a good looking slut to befriend you, why you might as well do her, just don’t merry her because she clearly doesn’t
have a soul and a conscience. Use her/him the way they want to use you, or do something even better, turn the government agent, give them doubts, by
giving them evidence that government no longer serves the people. Be it 9/11 inside job facts, or facts on Private Central banks, or facts on illegal
wars and world domination. Government sins are so great you can’t run out of materials.
How government agents establish history and credibility:
This is how they get you to trust a new person in your life, they first make sure that you see person A in the store or at the gas pump, even if you
move to another part of the city, that same person A you get to see in local Starbucks. The next phase is to start up a conversation, first
conversation is brief and may be work or whether related. For example first conversation might be a new neighbor asking for small help, or making
small ordinary complaint about something else etc. This relationship progresses until you start seeing person A as a friend, and then the information
extraction begins, the conversations become more focused with an agenda.
Let’s get Technical on computer hacking abilities of the government: Those of you who are technically oriented you will LOVE this information:
Please Pay Attention:
If your windows updates are disabled, as well as host of other internal Microsoft Trojans that government uses to get into your system. For example
Windows 7 will use scheduler services to spy on you, search function to spy on you, windows update as I already mentioned, default win 7 firewall
settings are designed to open up a hole for government spying if they need it. You have to disable all that self-update bull$hit of Java, FlashPlayer
internet browsers, time synchronization with Microsoft servers.
Your windows operating system is 100% like a cup with 1000 holes, it is leaking your information BY DESIGN,
You have to use programs like COMODO to block completely in and out traffic from the internet, and then you have to enable just enough of internet
access one by one, such as letting your browser access net, letting your mail access net, I won’t lie to you, this will take you 2 days of work even
if you know what you are doing.
But let me ask you. Do you want government to have control of you PC so they can upload child porn on it and frame you with jail time. Because if you
didn’t get it by now, you are dealing with bad motherfu%kers, Evil sons of bit#hes, these people have killed before and they will kill again, they
can frame you, or otherwise destroy your life with the same gusto as if they were eating an omelet.
Next government will set an internet trap for you, you will come across message while using internet email or whatever, how your PC needs to download
a newer version browser or flash player or whatever in order to work properly. THIS IS A TRAP, especially when you already have the newest version on
your PC that works properly, when you click on links provided to download whatever you supposedly need, you are downloading from un-official source
compromised software. However, if you like to play with dissemblers and codes you can download their Trojan and play with it, you might find just how
sophisticated it is, and you can come across filing report sections for FBI, CIA, Dep of State, as part of the Trojan.
Once they lose control of you PC and can’t come in anymore to install Trojans, they don’t give up. Why should they give up, they are paid 80 k a
year to work full time on victimizing you, you better believe your tax money will work against you.
Once they lose control of you PC. What government hackers do is, they send a wireless signal designed to lock onto wireless antenna on your network
card. To do this they need to know your mac address which isn’t a problem to find out. Their network signal completely bypasses firewalls and
proxies, because it is coming literally 150 or so yards away, it bypasses ip protocols and locks onto your antenna not from internet in this case,
where it has to wrestle with firewalls. Their devices can be fine tuned to lock on as soon as your router or network card in PC restarts, before
settings disable wireless once it locks on, it mimics your own router, trying to fool you into browsing the web through them. This signal is not
coming from space satellite or local cell tower. This stuff is coming 150 or so yards away, you got a government agent living within your
They fooled me very nicely until I figured out they are using serious technology against me. So what I am doing is having internet only through
physical cables. And that isn’t enough to stop interference, so I took a screw driver and physically destroyed antenna squares on the circuit board.
You have to be careful to destroy only the antenna, not any other pathways otherwise you’ll ruin your router or network card.
1 screw driver VS $10 000 hacking equipment, and YES it WORKS
You have to change your Mac Address through windows registry on daily basis. And you have to use offshore proxies and change them often though not on
daily basis, it takes government few days to find you on proxy Every time you are about to connect to internet you need to reset your router because
overnight government has hacked into your router through network cables and adjusted it to collect browsing information and send it to them.
Once router is reset, go into options, you can disable wireless, change gateway address change your mac address and IP address for router, Change Mac
address for your PC, restart your PC or network card, connect to internet through your COMODO firewall, monitor the gateway address, router IP and
subnet address to see if they match with your changes.
And because you changed your Mac address on router and PC network card, your ISP server will assign you a new IP address. Nice Eh.
As far as ISP server is concerned, you are new born baby first time surfing the net
, you still though have to use proxies because your new IP
address is a poor guarantee of privacy when it comes to soulless minions of the government. In fact, if you take your IP address and do a traceroute
both regular and SMTP traceroute, chances are you might see discrepancy which might suggest compromised connection. So proxies are a way to go, not US
proxies though, government agencies have their own proxies thrown into the mix.
Protection against tempest monitoring:
Government can use antennas to see what you see on your monitor even few city blocks away. How? Simple. They collect your monitor EMS radiation which
passes through walls. They reconstruct the signals into exact picture. As powerful as this is, protection is remarkably simple. Use laptop and move it
around randomly from room to room, or buy in hardware store tight aluminum wire mesh, and place it forming a cage, once inside 99% of your signals are
gone. Nothing for the government to trap.
Other wireless capabilities of government:
Government agents have the ability to erase your USB flash sticks clean wirelessly, yup you saw this right, they can erase your USB memory stick
wirelessly. How do I know? They did it to me repeatedly, one of my own spy camera is using flash memory SD card to store video files, after I found
government agents once again entered my home, I found on one of the camera’s SD card a Trojan program designed to spread to my PC on contact. I
found their Trojan and removed it, and indirectly sent spy agencies a message (by using email I know they monitor) how they failed on that front.
After that my USB and SD flash memory devices started to erase by themselves repeatedly without anyone touching them This was a mini revenge against
me, for my efforts against them.
Camera Tactics against government:
This is my favorite way of entrapping government agents, you take a small spy camera, and you don’t take effort to conceal it, just make it visible.
And take 2nd or even 3rd spy camera and conceal them. And to top it off take a spy audio recorder and conceal that as well. Even if agents find and
erase all your camera footage, you’ll get them on audio recorder clear as day. Police won’t help you, even though you got evidence, at that point
you will do some soul searching and realize, you live in techno-Fascism, and you are a victim of those whose true purpose is supposed to be to protect
Stay strong Stay true to who you are. All these Sons of Bit$hes will end up as your butlers if not in this world, definitely in the next one, I know
what I speak off.
You got power on your side that you are not even aware off. Make no mistake Universe is not without a sense of justice. Everything has an end, even
the mighty government.
PS: Don’t worry about what other mainstream misinformed zombies think about you. These are the clowns that will march to their death when government
orders them too, just like they finished 3000 Americans on 9/11. If you are reading this you at this point know who you are and what your worth is.
Opinion of sellouts, or idiots, should be meaningless to you.
If you got a comment or want to ask me a question email me at, firstname.lastname@example.org You can use a proxy and open a yahoo or hushmail or whatever
edit on 29-4-2012 by rory212 because: (no reason given)