Page 220 - Elana Freeland - Under an Ionized Sky
P. 220
“mirror” dense enough not just to detect and resist incoming cyber-attacks but to remotely utilize
exotic weapons on populations. From “psy warrior” microcomputers to cellular phones and
“critters” (hacker programs), our neighborhoods, homes, offices, and bodies are being hacked.
Telephone microphones, listening posts and fusion centers, traffic cameras, surveillance aircraft
like the U-2 Dragon Lady, satellite linkups with state-of-the-art software like British subsidiary
BAE Systems’ GXP 3D mapping and GOSHAWK big picture scrutiny—all are on constant EM
real-time alert, whether it is for a dissident or license plate, an impending engineered weather
event or forest fire. Everywhere is now the technocratic battlespace and everyone a twenty-first-
century land warrior “either with us or against us.” 64
Slide the Bill of Rights into the Memory Hole.
If we finally understand what dual-use technology means, we may realize that the user-
friendly home computer is little more than a base station for transmitting and receiving signals,
its cables unshielded, its telephone lines antennas, its CRT video display emitting
electromagnetic radiation at 2–20 MHz, and that cell phone handsets are little more than
minicomputers with software that can modify the usual interface.
Freelance journalist Jim Stone says dithering is doing for PC monitors what digital does for
65
television monitors, and television signals are 10,000 times stronger than GPS signals (which
may be why the CIA’s investment arm In-Q-Tel initially tracked people anywhere in the world
with just a $40 Rosum radio chip and TV signals).
It is technologies like these that are behind the demise of thinking and the deepening of
cognitive dissonance.
Computer monitors, like televisions, contain an electron gun (cathode ray) at the back of the
tube transmitting beams of electrons at the screen to make pixels fluoresce into a picture. In New
York, the NYPD might be driving their Z Backscatter Vans down your street and X-raying your
66
67
vehicle, home, and body while “war driving” Google Street View cars hoover up payloads of
data by means of the highly classified point-and-click TEMPEST (transient electromagnetic
pulse standard), also known as Van Eck monitoring (“phreaking”), that receives, intercepts,
views, and reconstitutes your incoherent signals—Google MAC (media access control)
addresses, SSIDs (service set identifiers), signal strength measurements—before transmitting
them to FBI techs, low-life contract agents, and NSA analysts.
C4 cyberwarfare is alive and well in the ’hood.
DCSNet of Communications Assistance for Law Enforcement Act (CALEA)—“The Gold
Standard in Public Safety”—collects, sifts, and stores phone numbers, calls, and text messages.
DCSNet endpoints connect to more than 350 switches. Besides monitoring servers and select
emails of surveillance targets for capture, analysis, and storage, the FBI’s Carnivore
accommodates a sophisticated point-and-click surveillance device to cover signals, telephones,
and Internet: DCS-3000 Red Hook (SIGINT) does pin-register (outgoing numbers) and trap-and-
trace (incoming); DCS-5000 Red Wolf is responsible for counterintelligence; and DCS-6000
Digital Storm, wiretap, captures content. All were initially processed by Sprint on a private,
encrypted network. FBI wiretap outposts are called Regional Information Sharing Systems
(RISS). An FBI agent in New York can wiretap a phone in California, get the location, and
receive pass codes and conversation in New York. Analysts interpret phone call patterns, then
send them on to the Bureau’s Telephone Application Database for link analysis.
Since CALEA, all cell phone manufacturers include Nextel software, which means that
whether the phone is on or off, the microphone is a remote roving bug that transmits. When a call
is in progress, the roving bug calls the FBI (or a corporate competitor) and activates the