The SINGLE Most Important Step to Protect Yourself from Government Spying

| |

Top Tier Gear USA


Given that the NSA is tapping into your phone calls and spying on your Internet activities, you might have switched to a search engine which is more privacy-conscious.

You might have started using encrypted communications.  After all, NSA whistleblower Edward Snowden and the leading electronic privacy group – the Electronic Frontier Foundation – say that encryption helps to protect privacy.   On the other hand,  Tech Dirt points out that the NSA might consider you suspicious if you encrypt information, and so hold onto your data until they can decrypt it.

The above are all issues about which you are at least somewhat aware.

But there is a giant type of snooping which you probably don’t even know about.  Specifically, ABC News reported in 2006:

Cell phone users, beware.  The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a “roving bug.”

Experts say the only way to defeat it is to remove the cell phone battery.

“The FBI can access cell phones and modify them remotely without ever having to physically handle them,” James Atkinson, a counterintelligence security consultant, told ABC News.  “Any recently manufactured cell phone has a built-in tracking device, which can allow eavesdroppers to pinpoint someone’s location to within just a few feet,” he added.


According to the recent court ruling by U.S. District Court Judge Lewis Kaplan, “The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.” 


“The courts have given law enforcement a blank check for surveillance,” Richard Rehbock, attorney for defendant John Ardito, told ABC News.


“Big Brother is upon us…1984 happened a long time ago,” he said, referring to the George Orwell futuristic novel “1984,” which described a society whose members were closely watched by those in power and was published in 1949.

CNET noted the same year:

The U.S. Commerce Department’s security office warns that “a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone.” An article in the Financial Times last year said mobile providers can “remotely install a piece of software on to any handset, without the owner’s knowledge, which will activate the microphone even when its owner is not making a call.”


Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone–all without the owner knowing it happened.


A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. “A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug,” the article said, “enabling them to be activated at a later date to pick up sounds even when the receiver is down.”

Given that the American and British intelligence agencies are trying tap every single communication, some rogue agency or contractor might be tapping your phone … even when it’s off.

Indeed, even private hackers might be listening in. Specifically, private parties without security clearance may be activating your microphone or camera without your knowledge.

Indeed, commercially-available, off-the-shelf software allows people to spy on you:

Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“) … and sending the information to private companies.

And CNET pointed out 7 years ago:

Malicious hackers have followed suit. A report last year said Spanish authorities had detained a man who write a Trojan horse that secretly activated a computer’s video camera and forwarded him the recordings.

So the single most important step to protect yourself from government – or private – spying is to remember that your conservations might not be private when your cellphone is nearby … even if it is turned off.

Note:  If you have a microphone in your car, that might also open you up to snoopers. As CNET points out:

Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors’ OnStar to snoop on passengers’ conversations.

When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.

And Fox news notes that the government is insisting that “black boxes” be installed in cars to track your location.

And see this.

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).

Contributed by Washingtons Blog of

Wake The Flock Up! Please Share With Sheeple Far & Wide:
  • XC

    Who says all this technology is good?

  • Heimdall

    The Republic and Liberty are dying the death of a thousand cuts. The one thing that you can do to protect yourself, the only thing that you can do to protect yourself, is to remove the organized criminals from office and from their bureaucratic positions.

    For those who say “yeah good luck with that!” I say:

    To make myself clear: I have studies these issues for many years. I write comments for the bold, the lover of liberty, and the lover of truth.

    I do not write for the fainthearted, the acquiescent, or the enabler. Nor do I write for those devoted to a continuing and uninterrupted life of sybaritic ease. If you excelled at sycophant, elitist, collectivist, authoritarian, enabling, politically correct, and authoritarian studies, don’t bother reading my comments, you are beyond redemption.

    For those who know that something is amiss but are unwilling to take large risks and make major changes, you are part of the problem. Those who say not to rock the boat too much for “They will do this and they will do that to us and there is nothing we can do!” are a waste of space. In fact, such people are actually our greatest enemies. For those with that kind of spirit, I urge you to cease interfering for such is great evil. Such people are without the divine spark within their souls. Those who beg scraps from, and pay homage to, the archons, are of no help and no use. You are also beyond redemption and the energies of all of the researchers and lovers of liberty are wasted on you. You have been given the right to choose your own path, but that does not mean that all choices are correct, nor does it mean that the path chosen for you by the archons is correct. Subservience to archons is not virtue.

    The archons are devoted disciples of the Great Deceiver. The Great Deciever clothes evil in vestments of false-righteousness. Those who can see past facades do not fall for their illusions.

    • Heimdall

      I have studies these issues for many years. I have read the work of the fine patriots who have ellucidated these issues.

      • Heimdall

        P.S. The majority of the new technology is subjugation technology. It has a subjugation enabling aspect to it nearly always.

      • Heimdall

        Correction, I have studied these issues. Please excuse my keyboard problems.