Page 220 - Elana Freeland - Under an Ionized Sky
P. 220

“mirror” dense enough not just to detect and resist incoming cyber-attacks but to remotely utilize
               exotic  weapons  on  populations.  From  “psy  warrior”  microcomputers  to  cellular  phones  and
               “critters” (hacker programs), our neighborhoods, homes, offices, and bodies are being hacked.
               Telephone microphones, listening posts and fusion centers, traffic cameras, surveillance aircraft
               like the U-2 Dragon Lady, satellite linkups with state-of-the-art software like British subsidiary
               BAE Systems’ GXP 3D mapping and GOSHAWK big picture scrutiny—all are on constant EM
               real-time alert, whether it is for a dissident or license plate, an impending engineered weather
               event or forest fire. Everywhere is now the technocratic battlespace and everyone a twenty-first-
               century land warrior “either with us or against us.” 64
                   Slide the Bill of Rights into the Memory Hole.
                   If  we  finally  understand  what  dual-use  technology  means,  we  may  realize  that  the  user-
               friendly home computer is little more than a base station for transmitting and receiving signals,
               its  cables  unshielded,  its  telephone  lines  antennas,  its  CRT  video  display  emitting
               electromagnetic  radiation  at  2–20  MHz,  and  that  cell  phone  handsets  are  little  more  than
               minicomputers with software that can modify the usual interface.
                   Freelance journalist Jim Stone says dithering is doing for PC monitors what digital does for
                                   65
               television monitors,  and television signals are 10,000 times stronger than GPS signals (which
               may be why the CIA’s investment arm In-Q-Tel initially tracked people anywhere in the world
               with just a $40 Rosum radio chip and TV signals).
                   It  is  technologies  like  these  that  are  behind  the  demise  of  thinking  and  the  deepening  of
               cognitive dissonance.
                   Computer monitors, like televisions, contain an electron gun (cathode ray) at the back of the
               tube transmitting beams of electrons at the screen to make pixels fluoresce into a picture. In New
               York, the NYPD might be driving their Z Backscatter Vans down your street and X-raying your
                                       66
                                                                                     67
               vehicle, home, and body  while “war driving” Google Street View cars  hoover up payloads of
               data  by  means  of  the  highly  classified  point-and-click  TEMPEST  (transient  electromagnetic
               pulse  standard),  also  known  as  Van  Eck  monitoring  (“phreaking”),  that  receives,  intercepts,
               views,  and  reconstitutes  your  incoherent  signals—Google  MAC  (media  access  control)
               addresses,  SSIDs  (service  set  identifiers),  signal  strength  measurements—before  transmitting
               them to FBI techs, low-life contract agents, and NSA analysts.
                   C4 cyberwarfare is alive and well in the ’hood.
                   DCSNet  of Communications  Assistance  for  Law Enforcement  Act  (CALEA)—“The Gold
               Standard in Public Safety”—collects, sifts, and stores phone numbers, calls, and text messages.
               DCSNet endpoints connect to more than 350 switches. Besides monitoring servers and select
               emails  of  surveillance  targets  for  capture,  analysis,  and  storage,  the  FBI’s  Carnivore
               accommodates a sophisticated point-and-click surveillance device to cover signals, telephones,
               and Internet: DCS-3000 Red Hook (SIGINT) does pin-register (outgoing numbers) and trap-and-
               trace  (incoming);  DCS-5000  Red  Wolf  is  responsible  for  counterintelligence;  and  DCS-6000
               Digital  Storm,  wiretap,  captures  content.  All  were  initially  processed  by  Sprint  on  a  private,
               encrypted  network.  FBI  wiretap  outposts  are  called  Regional  Information  Sharing  Systems
               (RISS).  An  FBI  agent  in  New  York  can  wiretap  a  phone  in  California,  get  the  location,  and
               receive pass codes and conversation in New York. Analysts interpret phone call patterns, then
               send them on to the Bureau’s Telephone Application Database for link analysis.
                   Since  CALEA,  all  cell  phone  manufacturers  include  Nextel  software,  which  means  that
               whether the phone is on or off, the microphone is a remote roving bug that transmits. When a call
               is  in  progress,  the  roving  bug  calls  the  FBI  (or  a  corporate  competitor)  and  activates  the
   215   216   217   218   219   220   221   222   223   224   225