|
Post by Dreamer on Jun 20, 2020 23:20:00 GMT
Hey everybody I was listening to an old podcast of "The Venomous Fringe" and Joedy was talking about the government harassment he's been through like the nonsense with his liscence tags and other petty examples and I have two comments. Firstly I think that the type of activity Iwill be the tipping point in confirming that these creatures exist. Also he was wondering how the government could know everything about the NADP and field locations. Obviously they track cellphones GPS, listening to convos etc. Another tactic that's been used on Mufon, BFRO has been infiltration into the higher ranks of the group. Anyway just some thoughts. Have a good weekend folks and stay healthy!
|
|
|
Post by ag47 on Jun 20, 2020 23:35:15 GMT
Deftly weilded, OSINT tools and tactics provide a surprising (to some) amount of information without ever resorting to the more active intrusions which may or may not require warrants and field resources.
You have a nice weekend also.
|
|
|
Post by Dreamer on Jun 20, 2020 23:37:39 GMT
No offence to Joedy. I dont know how to fix it.
|
|
|
Post by ag47 on Jun 20, 2020 23:43:41 GMT
I didn't take any offense to it. Autocorrect gets me often.
----------------
Seen on the web:
"Did you hear the guy who invented autocorrect died?"
"May he restaurant in peace."
"*Rest."
|
|
|
Post by SomeRandomUser on Jun 21, 2020 22:22:49 GMT
Yes ag47 is correct 100%. GPS/Email/SMS/Phone are actually all intercepted in fact in May your internet searches in say Google do not need a warrant (domestically - all citizens). As mentioned OSINT is widely used and people often do not practice "Safe Secs" from ComSec/OpSec/InfoSec/PerSec. There are currently programs in place where shipments of computers are intercepted and backdoored, this happens to networking devices as well although not supposedly not domestically. Scrubing metadata from photos and files, not sticking to one handle or alias in addition to securing your own devices is important, lastly the way you type/write or even speak can be analyzed to determine a person's identity (look at the founder of BitCoin). Consider using "VirtualMachines" (some are built for anonymity although FaceBook has paid for exploits to assist the govt in investigations - don't disagree for the investigation this happened in - give it a bit it'll be used in other investigations) and encrypting (use passphrases 22+ characters if possible for passwords) not only your host OS but also the guest OS, TOR and so on has been compromised long ago, VPNs often edge routers can be compromised to monitor sessions (major VPN provider had this happen a while back - NS A also has manuals on dealing with VPNs). (EG. Browsing the internet) Phones/TVs can be exploited, generally they run Android or a variant it's a trivial to compromise such devices and more so when resources are at your disposal and a lot of programmers. That 1.5 million dollar iPhone 0day is within your reach if you have a few hundred million to throw at it. It sounds crazy what I wrote, but search around you will find news articles documenting all of this. Consider burner phones/laptops maybe purchased by a friend, I wouldn't use the phones for too long as "String Ray" devices are deployed by 25% of all Law Enforcement and generally the govt get's the first crack and local LE get what is in their wheelhouse, I guess I would do it too if I got 84k per year and didn't have to pay for the device. (And no it's not targeted but a passive collection) A lot of what I mention doesn't need actual intrusion to the device, it's just radio frequencies at the end of the day when it comes to phones.
The human aspect or infiltration can be ferreted by using OSINT and social engineering to make sure people are really who they say they are. Exposing or proving certain things could cause issues if a govt knows things are out there and sat on it. If I wrote something which is not appropriate I apologize, I believe that we should know what exactly stands in our way.
|
|
|
Post by ag47 on Jun 22, 2020 0:06:37 GMT
somerandomuser - I don't see where you said anything inappropriate. You didn't advocate anything illegal that I see, just put out a whole bunch of very good information that ordinary, law-abiding people can legally use to learn more about how to protect their privacy and safety.
|
|
|
Post by SomeRandomUser on Jun 23, 2020 2:04:40 GMT
somerandomuser - I don't see where you said anything inappropriate. You didn't advocate anything illegal that I see, just put out a whole bunch of very good information that ordinary, law-abiding people can legally use to learn more about how to protect their privacy and safety. I appreciate that and hope that people do protect their privacy more. Something which should be said about non-existent license plates these are issued to LE be it federal or down to local PD, these are often used during surveillance as not to "burn" themselves (be recognized). From what I know the Motor Vehicle Department of your state actually will see that it is registered to LE, but will claim it doesn't exist and they are not on public databases. Say that they use the same two vehicles everyday well perhaps changing dress in between hand-offs of surveillance teams maybe also changing license plates would not give it away to a person that they are being followed or watched. Even in say a small state with a low population you might find that there is 3000 such plates, sometimes this number is allocated for one county or a large city. Anyways good luck and be safe out there.
|
|