1/30/2015

The Collective, The RFID & The NWO




The Collective, The RFID & The NWO





It has been said that the New World Order is the world’s governments becoming one and making one currency (Amero? Euro?)…
 
the idea of one world government is draconian. But if it is to become a reality, then it will need of nefarious acts, such as installing RFID chips in passports, or micro chipping babies’ hands when they're born.

 
RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart. About RFID chips in passports, they're only passive (PRAT- they don't have a power source) and can't be scanned from a greater distance, and if you don't have it with you, no one can scan it.”


RFID's are a very real problem!! Most RFIDs are passive energy activated. IE, meaning that they don't need a power source to be read. Have you ever walked out of a Wal-Mart or other large department store and have the reader alarm go off, just to have an associate ask you for your receipt then tell you to go on? It wasn't the merchandise you just bought that triggered the reader but rather some piece of clothing you were wearing or something you have on that was never deactivated and triggered it. Everything from tents to tampons are now being tagged.

A number for every item on the planet
“RFID employs a numbering scheme called EPC (for "electronic product code") which can provide a unique ID for any physical object in the world. The EPC is intended to replace the UPC bar code used on products today. Unlike the bar code, however, the EPC goes beyond identifying product categories--it actually assigns a unique number to every single item that rolls off a manufacturing line. For example, each pack of cigarettes, individual can of soda, light bulb or package of razor blades produced would be uniquely identifiable through its own EPC number.”
The same for medical implants of all sorts (from knee replacements to heart valves) are also being tagged as well. Semi-Truck trailers are being equipped with RFID readers so different companies can keep track of their products while in route via QUALCOMM.

New Generation RFIDs are full duplex compatible with
Wi-Fi, and if you want to see what the NWO is watch the old Star Trek- Next Generation episodes and movie about "The Borg". The Borg is a computer based organic hybrid, a living machine. On Star Trek all those assimilated are implanted to interact and become one with the collective. That is the NWO we somewhat live in now and where we are moving even quicker to an absolute fulfillment of the predictive programing seen on TV. Where you are either assimilated into the collective (NWO) or you die. 
"In their collective state, the Borg is utterly without mercy; driven by one will alone: the will to conquer. They are beyond redemption, beyond reason." - Jean-Luc Picard

"Theft will be drastically reduced because items will report when they are stolen, their smart tags also serving as a homing device toward their exact location."
- MIT's Auto-ID Center

Tags…tags or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response.
RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation.

Readers…
A Passive Reader Active Tag (PRAT) system has a passive reader which only receives radio signals from active tags (battery operated, transmit only). The reception range of a PRAT system reader can be adjusted from 1–2,000 feet (0–600 m).


An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags.


An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. 



RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro-transponders to live ants in order to study their behavior. This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances.




Uses
·         Commerce
·         Credit cards
·         Driver’s licenses
·         Access control
·         Advertising
·         Promotion tracking
·         Transportation and logistics
·         Intelligent transportation systems
·         Hose stations and conveyance of fluids
·         Public transport
·         Infrastructure management and protection
·         Passports (Biometrics)
·         Transportation payments
·         Animal identification
·         Human identification
·         Hospitals and healthcare
·         Libraries
·         Museums
·         Schools and universities
·         Sports

 

Le Bonus
1- The Next HOPE (2010): CV Dazzle: Face Deception
2- Track Me If You Can
3- 5 things you can do to bolster your online privacy
Absolute Internet privacy is a thing of the past – if it ever existed at all. However, these basic precautions can help you and your loved ones achieve a lower profile than 99% of everyone else.
  1. Decentralize Your Internet Services
    Don’t log into Google unless you have to. Rather go to Duckduckgo.com
  1. Install and Use Hypertext Transfer Protocol Secure (HTTPS)
  1. Use Epic Browser for private browsing.
  1. Always Read the Privacy Policy
  1. Make your IP Address Anonymous with the Tor Project
    www.torproject.org/download/download-easy.html.en.

@feexitmx
www.feexit.mx
rp@feexit.mx

1/16/2015

The Lost Decade


The Lost Decade

It has been 10 years since I got my first mobile phone and many memories come to my mind, the first phone that I had was a Sony Ericsson that I used to call R2-D2; the little bastard was resilient (took several plunges into all sorts of beers), the life of the battery was amazing and the most important part was that I had no need to look at it constantly because:

 
1) The display was monochromatic and tiny.
2) SMS was expensive
3) The games sucked

One thing that I miss the most about that phone was that I tuned it with stickers that I would rip from beer bottles, some sort of “drunk passport”, if you will.

We have seen the evolution of mobile technology; from expensive to somewhat affordable; from all Blackberry to Apple, and then Android… and Windows. But seems like we are somehow stagnant among 2 main Operative Systems (perhaps 3)… but what makes them different and how are they the same?



The Latest…



Because of Stylometrics, we will limit ourselves in this review and will only analize the two most popular operative systems in the world: Android and iOS by Apple.



 

Android

iOS
Developer
Google
Apple Inc.
Customizability
Can change almost anything
Limited. Jailbreak ;-)
Media transfer
depends on model
with desktop application
Available on
Many phones and tablets including Kindle Fire, LG, HTC, Samsung, Sony, Motorola, Nexus, etc.
iPod Touch, iPhone, iPad, Apple TV.
Internet browsing
Google Chrome (other browsers are available… Orbot)
Safari (other browsers are available)
Open source
Kernel, UI, and some standard apps
The iOS kernel is not open source but is based on the open-source Darwin OS.
OS family
Linux
OS X, UNIX
Messaging
Google Hangouts
iMessage
Voice commands
Google Now
Siri
Maps
Google Maps
Apple Maps
Device manufacturer
Google, LG, Samsung, HTC, Sony, ASUS, Motorola, etc.
Apple Inc
Available language(s)
32 Languages
34 Languages
App store
Google Play – 1,000,000+ Apps.
Apple app store – 1,000,000+ Apps




Devices:

Android devices are available at many different price points, sizes and hardware capabilities.
iOS is only available on Apple devices: the iPhone as a phone, the iPad as a tablet, and the iPod as an MP3 player. These tend to be more expensive.



Mobile payments:

Android uses Google Wallet, some Android phones are equipped with an NFC chip (near-field communication) that is used for making wireless payments simply by tapping the phone at the checkout counter. This service integrates with Google Wallet but is not available on all Android phones or wireless carriers.

iOS uses
Apple Pay. Its integration with fingerprint identification arguably makes Apple Pay easier to use. iOS offers Passbook, an app that collects in one place tickets, reward cards, and credit/debit cards.



Security:

Android’s applications are isolated from the rest of the system’s resources, unless a user specifically grants access to other features. The most widespread malware on Android is one where text messages are sent to premium rate numbers without the knowledge of the user, and the sending of personal information to unauthorized third parties. As it is the more popular smartphone operating system, it is more likely to be the focus of attacks.
iOS… Apple reviews all the apps and verification of the identity of app publishers. However, if the iOS device is subject to Jailbreak and apps are installed from outside the App Store, then it can become vulnerable to attacks and malware. 

 

iOS
  • Massive app ecosystem
  • Deeper integration with Facebook and Twitter
  • iOS-only apps
  • Interface is locked down
  • Software upgrades
  • Better privacy controls
Android
  • Massive hardware selection
  • Highly customizable user experience- Several people have shifted from iPhone to Android. Android's connection to the Google ecosystem of services is strong and arguably more useful compared with Apple's cloud services suite.
The Master.
Diagnostic Capabilities”… it all started as “a security feature”, “an experiment”, “customer service satisfaction surveys”, “maintenance”…  then this “toy” called Stingray was developed for the police… and it ended up in Malte Spitz exposing Deutsche Telekom.

 

Location tracking… The deepest privacy threat from mobile phones is the way that they announce your whereabouts all day and all night, through the signals they broadcast.



Kudos to EFF!

Beware of:
1) Mobile signal tracking — Towers
2) Mobile signal tracking — IMSI catcher
3) Wi-Fi and Bluetooth tracking
4) Location information leaks from apps and web browsing
5) Turning phones “off”… if many people at one location all do it at the same time, it's a sign to the mobile carriers that they all thought something merited turning their phones off. (That “something” might be the start of a film in a movie theater, or the departure of a plane at an airport, but it might also be a sensitive meeting or conversation.) An alternative that might give less information away is to leave everybody's phone in another room where the phones' microphones wouldn't be able to overhear the conversations.
6) Burner phones… Phones that are used temporarily and then discarded…There are a number of limitations to this technique, though.


…A note about GPS… GPS satellites only transmit signals; the satellites don't receive or observe anything from your phone, and the satellites and GPS system operators do not know where any particular user or device is located, or even how many people are using the system. This is possible because the individual GPS receivers (like those inside smartphones) calculate their own positions by determining how long it took the radio signals from different satellites to arrive. The tracking is done by apps running on a smartphone. They ask the phone's operating system for its location (determined via GPS). Then the apps are able to transmit this information to someone else over the Internet.


 

Spying on mobile communications…Mobile phone networks were not originally designed to use technical means to protect subscribers' calls against eavesdropping. That meant that anybody with the right kind of radio receiver could listen in on the calls.

 
Infecting phones with malware… Phones can get viruses and other kinds of malware, either because the user was tricked into installing malicious software, or because someone was able to hack into the device using a security flaw in the existing device software.

So, why The Lost Decade? Well… we have closed many gaps because of the internet, we have been able to reach and meet people that in other circumstances we would not be able to… but we have turned into a more ignorant and narcissistic society, a society in which the ego and appearances are everything… 


 

...a society in which good and evil have switched names, making everyone believe that compliance and submission are freedom and peace.  
 

 
ACLU-How the Government Is Tracking Your Movements

P.S. It´s been two years since Aaron left, but the legacy of the Internet’s Own Boy remains. 



 

First: Stay curious.
Read all the time.
Second: Don’t accept things as they are, or assume they’re that way for a good reason. Aaron questioned everything. Sometimes it got him into trouble. But the beauty of skepticism is that sometimes you see things everyone else is furiously ignoring.
Third: Become good at something. And then use it to make a difference. Aaron was a genius computer programmer. He said it was like having magic powers: he could think of something and then make it real.
Fourth: Ask yourself what you could do to make the biggest difference in the world. And then challenge your answers. A raft of psychological research tells us that humans generally do things first, and then come up with reasons for them afterwards.
And lastly: Stay alive



@feexitmx
www.feexit.mx
rp@feexit.mx