They're watching you

Big Brother and Big Crime wants your data
Photo by <a href="https://freeimages.com/photographer/bvdwiel-41717">Bas van de Wiel</a> from <a href="https://freeimages.com">FreeImages</a>

They're watching you

History

Mobile phones became popular and commonplace during the 1990s. They changed from the bricks they started off as, that were impossible to put in your pocket, to sleek devices people carry everywhere, on them, and at all times.

The progression of the Gs from 2G to 4G represented significant steps in functionality from adding in texting to the full SMART phone experience we have now where people can monitor their email, browse the www, play complex video games and of course interact with millions of people worldwide via social media and various facetime apps. Conversations with friends on the other side of the world no longer have a massive satellite delay!  Mobile phones have made the world a smaller space ... but it comes at a price.

Listening devices

As far back as the early noughties I discovered that mobile phones could be used as surveillance devices to listen into conversations. Whenever I met up with my friend Lew from the USA, we often discussed potentially sensitive subjects. Lew would get everybody present to take out their mobile phone and remove the battery. He had worked with the US Government at various times, and it was Lew who told me that even with your phone switched off, the microphone remains active and can be used to listen into conversations. Why do you think it is now impossible to remove your mobile phone battery in modern phones..?!!

Of course, it isn’t just the microphone that can be used for surveillance. All the GPS tracking equipment you use for navigation, and other apps where your location is used to link you with nearby services/people, are able to monitor and record your position and potentially place you at any time of the day or night.  Private Investigators must have thought their prayers had been answered when they found that all they needed to do is hack their target’s phone and track their whereabouts with it!!

Your back camera can potentially be remotely activated whilst your phone is face down too.  This would enable a visual on your activity and could of course coordinate with the microphone for full video surveillance. The front camera is effectively put out of action by always putting your phone down on the screen side.

“I’m not bothered.”

Worrying about the Authorities being able to tap into your phone may seem unnecessary and trivial. “I have nothing to hide” is a common statement people use to justify giving up their inalienable human right to privacy.  However, we all have a duty to ensure we preserve all our Human Rights and freedoms for now and future generations, because once given up they will never be returned.  History tells us that it is only a matter of time before such powers are abused. You may trust the UK’s current Communist Conservative Party (CCP) but when China’s CCP are running the NWO globalist Technocracy as suggested by Klaus Schwab and the WEF, you might just live long enough to regret it.

We’ve all seen reality TV and films where people are tracked via their technology – their mobile phone, places where credit cards are used etc.  Once gathered, information can also be tampered with - to place you anywhere “they” want you to be.  As in a number of movies, it could be the scene of a crime and used to convict you, or just to limit your ability to go where you want. What court or jury is going to doubt that sort of evidence, especially if you have no verifiable alibi to confirm you were elsewhere?

The signs are here already…

This may all seem rather paranoid and far-fetched, but given the current climate of censorship that has evolved to stop people spreading information about aspects of SARS-CoV2 research  and other truths about the Plandemic, to silence those who speak out against the narrative and who organise gatherings etc, it isn’t a great leap to setting people up beyond just words to discredit them, or at worst “make them disappear”.  It is well known that this has happened in past and current totalitarian societies.  Why not future ones? 

Bans from Facebook may seem petty and innocuous too, but they are putting us into the mindset where we don’t necessarily think twice (or for very long) if people suddenly drop off our radar. If you’ve seen my blog on the Irish gestapo who used the Mental Health Act to detain individuals on spurious grounds in the middle of the night, where exactly do you think the Authorities anywhere are prepared to draw the line?  As I said in that blog, if it can happen in Ireland, where don’t you think it might happen?

Identity Theft happens

Of course, it isn’t just rogue Governments and their agencies that can use such information against you.  Organised crime is already big business. People have sensitive data stored on their phone – bank details, website logins, apps to pay using your phone not to mention other sensitive data and photos etc. People have already been scammed, and it's not just the material losses that hit hard, it's the psychological impact too.

Your Data is valuable

It isn't just Big Brother and Big Crime who might want to hack your phone either. Big Tech is notorious for listening into our conversations, texts and analysing our browsing history even when you're not on their social media platform etc.  How often have you had a conversation with someone about something relatively obscure, and a related advertisement has appeared in your news feed? You may think it's customer service and useful, but ultimately it is an abuse of your right to privacy however much you've been tricked by the small print into agreeing to it.  Consequently your data has value, both specifically to you, but also in terms of group/cohort analysis for mass marketing (or brainwashing) campaigns.

Question: Why does anybody want to buy your data off the NHS , even if it's anonymous?
Answer: Because they can analyse group data and try to work out how and what to market to certain cohorts of people nationally and geographically by age, gender, or whatever to maximise their return on advertising investment.

Sophisticated scanners can hack your phone and record such information either by searching through what’s stored on it, or by screening your ongoing activity. For this reason I refuse to have a banking app on my phone. However much your bank tells you it’s secure, they have no way of knowing your circumstances.  They can’t even stop organised criminals from hacking into the banks’ own genuine phone systems and looking like it is your bank who are phoning you!! Bank accounts could be cleaned out, or they take regular smaller amounts they hope will slip under the radar on an ongoing basis. Security experts will tell you these apps are not as secure as you like to think.   Information from your diary/calendar tells someone when you’re away from home - at work or on holiday etc.  Insurance companies already refuse to pay out if people inform potential burglars about your future plans to not be at home via social media. At what point will they consider having such data on your phone creates a self-generated liability too? 

The intended Internet of Things (IoT) with lots of SMART gadgets all connected by 5G will also be a wealth of data that can be analysed too, and don't even get me started on the Internet of the Body where Klaus Schwab etc would like to put implants into your brain that could not only monitor you but influence your decisions too.  For £x you will effectively be told what brand of something to buy! Where would it end?

What can you do when switching your phone off isn’t necessarily the answer?

Clearly, switching off your phone doesn’t prevent access to it’s functionality in order to use it against you. What can you do?  Some of the steps you can take are practical common sense that involves how you use your phone and manage your affairs.

  1.  If the information isn’t there it can’t be stolen. The most obvious solution is simply not to use apps and store data on your phone that could enable would-be hackers from accessing it
  2. Use 2FA or similar, for logging into sensitive websites that requires you to input a code generated at the time of logging in. If someone has your login username and password it isn’t enough to login without the current code that only lasts 20 secs at a time before changing
  3. Manage your bank accounts so that only relatively small amounts are in a current account that you top up from elsewhere. This ring fences your money.
  4. Resist using payment apps and keep using cash. This is important for financial reasons as well that I will deal with in a future blog.
  5. Don’t scan QR codes you don’t know what they are, even if there’s a label for it that sounds bona fide. Fake QR codes can be stuck over genuine ones, so check them carefully before scanning even if you're confident they're likely to be genuine.
  6. Use TOCA products...

TOCA

TOCA are a German company that recycle as much of their materials that they can to create a range of products that help keep your information safe, maintain your human right to privacy and with other additional benefits that help protect you from close exposure to electromagnetic radiation from your phone.

TOCA No Signal sleeve

The TOCA No Signal Sleeve is a faraday bag to keep your phone in when you aren’t using it.  No signals can penetrate it to hack your phone and steal your identity, or use your phone to track or monitor you. It means you will only receive calls, texts and notifications when you take it out – when you’re ready for them. It means you can ensure no distractions during important meetings, whilst driving and during your favourite TV program! The added benefit is that the EMFs from your phone cannot harm you whilst you are carrying it in a pocket or elsewhere on you. Also available in red or green.

TOCA Faraday Pouch

The TOCA Pouch is similar to the No Signal Sleeve but has other compartments for chip & PIN credit/debit cards, your biometric passport etc so they cannot be hacked and used to plunder your accounts and steal your identity.

TOCA Microphone blocker

The TOCA microphone blocker plugs into your phone jack/or socket adapter that came with your phone and stops your microphone from being used to listen in on your conversations.

TOCA Microphone blocker

The TOCA camera cover is a simple  sliding shutter that fit over a rear-facing camera on your phone to stop it from being used to watch your activities when your phone camera isn’t in use. There are 3 in a pack as many phones have multiple cameras these days, and/or you can use it on a laptop or tablet cam too.  When you want to use your phone cameras simply slide the shutter(s) to one side from in front of the lens.

In Summary

At a time when our Human Rights are under attack and fear is being used to exaggerate the situation to justify removing our freedoms, we need to do everything to make sure we keep them and in doing so honour our ancestors who fought in both World Wars for the freedoms we have enjoyed until very recently. Don't make it any easier to hack or track you than necessary, even if you think you're being monitored in other ways. 

To find out more information and to get your TOCA protection you can link through the pictures above or go to our Electromagnetic Solution website here

I will do a separate blog on the known dangers of electromagnetic radiation to our health in the near future.

Share:

Related Posts

Slowly slowly catchy monkey

Slowly slowly catchy monkey

Corruption

Corruption

Jib-Jab Repercussions

Jib-Jab Repercussions

This new website

This new website

Sickness is Health

Sickness is Health

What makes us Human?

What makes us Human?

p53

p53

Save the Kids

Save the Kids

Cryptocurrencies

Cryptocurrencies