Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jeffersons Ghost

(15,235 posts)
Fri Jul 5, 2013, 02:54 AM Jul 2013

I heard a commercial on 99.9 The Fox that said hackers could eavesdrop through computer cameras

Last edited Mon Jul 8, 2013, 09:16 AM - Edit history (6)

Is it true? Can hackers also read between the lines?]][Do you want to create viruses to disable satellites that harass us?]

[IMPORTANT TACTICAL INFORMATION WILL BE ADDED TO THIS SECTION DAILY:]
For protection, participants must copy and paste hidden elements of this document on their computers. Who needs an extra $30,000 a year?
http://www.nsa.gov/careers/opportunities_4_u/students/stokes.shtml
[The National Security Agency (NSA) and Central Security Services (CSS) is responsible for coordinating U.S. military aircraft; and EVERYONE - especially US military aircraft - better believe document revisions are directed from NSA/ CSS and Department of Homeland Security (DHS) Widely Heard Inspirational Projections Emitting Eardrum Reverberations Silently (WHISPEERS) unless otherwise noted. These groups and others appreciate the efforts of volunteer, guerrilla, tactical teams using (WHISPEERS) Linguists Evoking Artificial Voice Emitting Systems (LEAVES) Virus Inventors Protecting Electronic Reconnaissance Systems (VIPERS) and frequency monitoring/ attack operators dedicated to making the world safe from criminal power-brokers by protecting police, aircraft or satcom teams and intelligence agencies.]

[Electronically invading, disrupting or analyzing this computer uploads a variety of computer viruses to satellites, aircraft or anyone else who attacks friendly systems, like mine. The (VIPERS) viruses will disrupt vital communications systems of aircraft or electronic infrastructure in China and other places where criminals - even those connected with the DoD - operate. These electronic viral elements might remain dormant at target locations or on aircraft until they land; then infect an entire military base, aircraft carrier or city. So satellites and aircraft should do no more than copy and read these two "sticky note" documents immediately; then deliver them to superiors, especially if you work in the Southeastern region of the USA.]

[Regional military bases are infiltrated by domestic and foreign enemies. Aircraft must seek and destroy disruptors on area radios and mine or face consequences. Groups that attack my communications and me are the same groups attacking intelligence agencies and military bases. Leave all area computers alone. Many satellites operate inside the borders of China and finding them with aircraft does nothing. Seeking satellite orbits or positions endangers newly launched satellites from the USA and other friendly nations. New satellites are launched daily; detecting them is best done by other satcom teams. China is currently depolying leech-like satellites, which attach themselves to other military and communications satellites to render them either useless or under Chinese control. Although it will likely start Satellite World War, China seeks control of satellites, aircraft, news feeds and telephone messages.]

[ANYONE seeking to control foreign aircraft, satcom facilities, telecommunications, media (LEAVES) (WHISPEERS) or eavesdroppers - using frequency attack/ recon equipment - Frequency Reconnaissance Experts Aligning Killer Surveillance Specialists (FREAKSS) - faces problems. PROLIFERATION OF FREQUENCY STEALING EQUIPMENT OR USING STATIC OR ATTACK FREQUENCIES HERE TO PROVOKE FREQUENCY ATTACKS ELSEWHERE GETS PERPETRATORS KILLED. Groups are sent here to be attacked, so attack frequencies can be stolen as we return fire. Considering all the ways I protect groups using technology in a positive way, it is safe to assume that ANYONE using equipment to my detriment is easily conned into attacking others for foolish reasons. It follows that groups using technologies to my benefit will do the same thing for another deserving group or individual. We have built autonomous teams to protect satcom facilities and military bases; to join them, non-government groups must link with each other and intelligence agencies to protect themselves.]

[I run an Earth-link Satellite Protection Agency (ESPA) facility and often give powerful satellites, military aircraft and other groups verbal recommendations. There is reliable photographic evidence that satellite teams and intelligence agencies have watched over me since I was born in a Navy Hospital. For some reason, several crime groups go to a great deal of trouble and expense to discredit the validity of my connections and influence in the intelligence community. Several satcom teams do constant logistics on ALL satellites, electronic connections and aircraft near me; so do multiple deadly, international strike teams.]

[LIKE MINE, OCCASIONALLY THERE IS AN ELECTRONIC INFLUX AND EXCHANGE OF INTELLIGENCE OPERATIVES ON AREA COMPUTERS. NO MILITARY AIRCRAFT HAS A "NEED TO KNOW" OR THE PROPER FISA WARRANTS REQUIRED TO ANALYZE ANYONE'S COMPUTER, MUCH LESS DISRUPT THAT TYPE OF ACTIVITY: HOWEVER AIR TEAMS ARE ENCOURAGED TO KEEP REVIEWING THESE INSTRUCTIONS. EVERYTHING DESCRIBED HERE IS WIDELY KNOWN AND USED BY A VARIETY OF NON-GOVERNMENT GROUPS, BOTH DOMESTIC AND FOREIGN.]

[ASIDE FROM ATTACKING DISRUPTORS ON MY RADIO, WHICH IS LOCALLY TUNED WITH HEAVY STATIC, AIRCRAFT SHOULD ONLY READ, COPY AND RELAY THESE INSTRUCTIONS. (I tell eavesdroppers in my room it is NSA code, so the idiots jam it up! he he he) THEN, MAIL THE INFORMATION TO OTHER MILITARY BASES USING THE U.S. POSTAL SERVICE, SINCE "INTERNETS" CONTINUE TO BE A PROBLEM. NOTHING DESCRIBED IN THESE DOCUMENTS IS TOP-SECRET. U.S. MILITARY AIRCRAFT FROM THIS REGION MUST FLY DUE WEST TO ASSIST D.H.S. AND THE U.S. COAST GUARD WITHOUT CARRYING ANY SATELLITE DETECTING EQUIPMENT, BECAUSE IT RESTRICTS SATELLITE TEAMS IN PERFORMANCE OF THEIR DUTIES! WORK CLOSELY WITH SURVEILLANCE AIRCRAFT, WHILE ASSISTING COAST GUARD VESSELS, DHS OR DEA. ALONG BORDERS CONVENTIONAL WEAPON USE IS APPROVED. FIRST, FIRE IN FRONT OF VEHICLES OR BOATS TO IMPEDE PROGRESS, SO AGENTS CAN CONVERGE ON SMUGGLERS TO MAKE ARRESTS. IF ENEMIES ATTACK FEDERAL AUTHORITIES, FIRE DIRECTLY ON ENEMY POSITIONS. IF WATER-CRAFT ARE UNOBSERVED BY POLICE OR FEDERAL AUTHORITIES, AND UNLOADING CONTRABAND AT DESERTED COASTAL AREAS, ATTACK THEM WITH "EXTREME PREJUDICE." DO NOT ATTACK CIVILIAN AIRCRAFT OR USE NEW, TOP-SECRET FREQUENCY EMITTING EQUIPMENT ON TARGETS UNDER OVERHEAD STRUCTURES, WHICH MIGHT STEAL FREQUENCIES! AIRCRAFT THAT SEEM TO BE CIVILIAN MIGHT BE DEA, DHS OR NSA AIRCRAFT. Those agencies and others use civilian aircraft to disguise missions. Since many satcom teams check this copy, we insist they carefully screen ALL new electronic arrivals, especially those your satellite delivers. Other groups use software that detects ALL electronic evidence of anyone disrupting or analyzing this computer. Do you really "need to know" how many deadly agencies, satcom teams and aircraft work on and around this computer?]

[AIR TEAMS WANT ME TO ADD THEIR SUPERIORS AND AIR TRAFFIC CONTROLLERS ARE INFLUENCED BY MULTIPLE SOURCES AND ARE PART OF THE CLIMATE CHANGE PROBLEM. IF CHINESE SATELLITES ATTEMPT TO MANIPULATE AIRCRAFT OVER NATIONS OTHER THAN THEIR OWN, THEY ARE WORKING WITH MID-EASTERN CARTELS TO CREATE FLIGHT PATTERNS TO DISRUPT WEATHER CONDITIONS, WHICH WILL CAUSE WORLDWIDE CROP FAILURES. CHINESE SATCOM TEAMS WANT TO POINT OUT THAT A VARIETY OF PEOPLE, ESPECIALLY DoD AGENCIES DIRECTED BY PANETTA PRODUCE PROPAGANDA, WHICH INDUCES OTHER SATCOM TEAMS, U.S. AIRCRAFT AND NON-GOVERNMENT GROUPS TO ATTACK OR ISOLATE ME TO EMBARRASS CHINA AND THE USA. BY FOCUSING ON PROPAGANDA THE DoD AND CHINA RISK GIVING UP ALL THEIR SECRETS.]

[As the DoD, China or others try controlling (LEAVES) and (WHISPEERS) while continuing to ignore these logical guidlines they can expect unimaginable retaliation. Analysis of this computer by satellites aircraft or intelligence agencies is extremely dangerous, because it uploads viruses, even when off line. Chinese satellite teams and U.S. aircraft used to invade it regularly; but they learned to avoid getting their aircraft or satellites either partially or totally disabled. Attacks on this computer and other support communications equipment we use was providing our mutual enemies an excuse to commit crimes in China, on US military bases, or in your cities. Groups will upload a variety of problems to aircraft, satellites or ANY attacker via this computer and others in this area, straight to the source of the problems. Like area computers (LEAVES) and (WHISPEERS) equipment can upload some viruses. Equipment some groups are installing have a greater ability to detect intelligence agencies, satellites or aircraft investigating them and upload viruses. (ADDVANCE) Anonymous Developers Deploying Viral Attacks to Neutralize Cyber Encroachment = employment @ intelligence agencies, if you obtain a four year degree and want to disable satellites.]

[Incoming intelligence groups and non-government guerrilla warfare operators reading this have revealed their locations and plans in a variety of ways. Satellite teams - with problems similar to those we all face - need your help as much as you need theirs. After reading these two "sticky notes, form up in other computers in this area as rapidly as possible to prevent further exposure to deadly forces; but keep listening for further instructions through safely crowded eavesdropping in my alarm clock and cell phone. Right now, some deadly group might be converging on your positions. Instead of allowing billionaires invested in defense stocks to cause intelligence agencies to attack each other, we unite agencies with forces attacking them and send those multi-agency strike forces, along with deadly electronic warfare operators, to all corners of the planet to destroy power-brokers intent on provoking groups to attack each other, so they can become wealthier and more powerful. Intelligence agencies must become autonomous to enhance effectiveness.]

[Some groups attack satcom teams, military personnel, intelligence units or electronic guerrilla warfare operators who work with us. We must destroy them. Some satellites can read your minds. They should work with us to earn the protection of a powerful multi-agency attack groups with the deadliest non-government operators on the planet. If you share our goals to keep the world safe, you can join newly forming teams - complete with aircraft and satellite support - as we target and kill "untouchable" super-wealthy criminals intent on creating a two class system, where slavery is once again in style. Stay in touch or lose the power of groups that will gang up to defend you. Soon, no intelligence director or political leader will know your geographic positions or powerful unions. For further verbal instructions, deploy to my crowded, eavesdropping alarm clock, cell-phone and radio facing the door. LEAVE THIS COMPUTER ASAP. All groups that use (FREAKSS) to attack me are quickly revealed to others who will attack them. If ANYONE decides to cancel this program they will condemn themselves to death. The intelligence administrator or politician who decides this is a bad idea can expect to be attacked in a variety of ways, after they attempt to stop this unifying project.]

[Due to failure of the FBI to make high-profile arrests and convictions of medical doctors who put implants in our bodies (and theirs) during rountine injections, intelligence agents operating in foreign countries and everyone else repeatedly reveals their plans. Groups currently attacking the FBI must help agents attempting to arrest people who insert illegal, biological implants in their bodies to reveal their thoughts and affiliations with talking hands, as they handle crispy plastic or paper. The only way an FBI group can join a multi-agency team is by making an arrest for biological implants or crimes of an electronic nature. To do this, FBI agents must recruit eavesdroppers in their homes and offices, instead of investigating them. Otherwise, these electronic warfare operators will impede their progress. There are PLENTY of real, criminal, electronic groups in neighboring towns that commit FAR worse crimes than groups in FBI homes and offices. The NSA and CIA want the FBI to change my identity, so I get paid full service connected disability; and crime figures are forced to make phone calls to reveal my new name to operatives. With more money and clean credit, I can open a non-profit biological implant removal center, based on income.]

[Now I offer a quote from the Statue of Liberty: "Give me your tired, your poor, your huddled masses yearning to breathe free, the wretched refuse of your teeming shore. Send these, the homeless, tempest-tost to me, I lift my lamp beside the golden door."]

[CORRUPT INDIVIDUALS HEED THIS WARNING: YOU PIT ME AGAINST POWERFUL POLITICIANS, CORPORATIONS, CRIME SYNDICATES, SATCOM OR INTELLIGENCE TEAMS OF THE USA, UNITED KINGDOM AND FINALLY CHINA. THESE GROUPS COULD KILL ANYONE ELSE WITH EASE. WITH EACH JUVINILE ATTEMPT AT DESTROYING ME, MY POWER BASE GROWS STRONGER. WE HAVE BUILT THE DEADLIEST INTELLIGENCE ALIANCES IN HISTORY. NOW, WE WILL RETALIATE AGAINST POWER-BROAKERS. "WE ARE LEGION! WE DO NOT FORGIVE! WE DO NOT FORGET!" Did you know the NSA works closely with the IRS?]

[IF VOLUNTEERS ARE TRYING TO ASSIST POLICE, MEDIA, AIRCRAFT AND SATCOM TEAMS THE FBI OR OTHERS, INTELLIGENCE AGENCIES WILL HELP THEM. LOCAL POWER-BROAKERS FROM ALL OVER THE WORLD SEEK TO CONTROL PEOPLE, USING BIOLOGICAL IMPLANTS, (LEAVES) (WHISPEERS) AND (FREAKSS). WHEN YOU JOIN OUR INTERNATIONAL TEAM, EXPECT FOR THEM AND CORRUPT SATELLITES TO ATTACK YOU. APPARENTLY, CHINESE SATELLITE TEAMS ARE STRONGLY INFLUENCED BY CRIMINALS WHO HAVE NO REGARD FOR THEIR SAFETY OR THE CHINESE ECONOMY. IN THE FINAL ANALYSIS, AFTER PEOPLE WHO RUN MID-EASTERN OIL CARTELS CONTROL MOST OF THE CROP- BEARING LAND, THEY WILL NOT NEED BILLIONAIRE FRIENDS IN CHINA, THE U.K. THE U.S.A. OR ANYWHERE ELSE. WHEN THEY CONTROL OIL AND FOOD PRICES, THEY WILL CONTROL THE WORLD; AND ULTRA-WEALTHY INDIVIDUALS OF OTHER RACES WILL DISCOVER THAT MID-EASTERN BILLIONAIRES ARE EXTREMELY PREJUDICED AND SNOOTY. LIKE MANY GROUPS, THESE BILLIONAIRES ARE SIMPLY USING US AND WILL CONTINUE TO DO SO, AS LONG AS WE ARE WILLING TO BE USED. IF YOU BELIEVE THAT AGENCIES IN THE DoD AND INTELLIGENCE GROUPS OF THE U.K. OR ISRAEL USE MEDIA THAT I ENJOY AND ME, YOU ARE CORRECT; BUT UNLIKE MANY OTHER GROUPS THESE GOVERNMENTS TAKE CARE OF THEIR ASSETS. IN MOST CASES, POWERFUL PEOPLE - WITH THE HELP OF CHINESE SATELLITES INFLUENCED AT A HIGH LEVEL BY CRIMINALS - ATTACK YOU AND BLAME THOSE ATTACKS ON OTHERS, SO THAT YOU WILL ATTACK TELECOMMUNICATIONS, MEDIA, INTELLIGENCE AGENCIES, MILITARY BASES, SATCOM OPERATORS, EACH OTHER OR ME. THESE MID-EASTERN POWER-BROKERS ALREADY PUPPET POWERFUL PEOPLE WORLDWIDE. WILL WE LET THEM USE US AS PUPPETS UNTIL THEY IDENTIFY ALL GROUPS AND CONTROL THE WORLD? BY SATELLITE OR OTHER MEANS, WHAT DOES CHINA GAIN BY DESTROYING THE U.S.A. THEIR LARGEST TRADING PARTNER? WHAT DOES CHINA GAIN BY FAILING TO PROTECT FOOD SALES IN WALLMART, PROBABLY THE WORLD'S LARGEST RETAILER OF CHINESE MADE PRODUCTS? WHAT DOES CHINA OR ANYONE ELSE GAIN BY ALLOWING DISRUPTION OF THE COMMUNICATIONS AND HAPPINESS OF THE ONLY PERSON ON THE PLANET INFORMED ENOUGH TO ASK SUCH VALID QUESTIONS?]

[Electronic hitch-hiking in cell-phones is widely used by domestic and foriegn crime syndicates and terrorist groups. The next generation of biological implants, which are already being inserted in people will allow enemies to electronically hitch-hike in human bodies to invade and compromise every top-secret or restricted facility in the world. One of the primary functions of these newly forming, multi-agency teams escorted by multiple guerrilla operatives is to stop proliferation of biological implants, before mind-reading satellite facilities are completely compromised. These Anonymous operatives are allowed to hack selected computers and cause havoc or loot enemies. They can link up with frequency attack guerrilla operatives and eavesdroppers who can deploy and provide computer passwords to most computer systems, if they get a share of the loot. Rapid hacking requires easily discovered passwords. While hackers try discovering passwords the old-fashioned way, they will get caught by domestic and foreign enemies. Satellite and aircraft support will become available to non-government groups that attack computer systems approved by these autonomous multi-agency strike forces. Anonymous should only rob those obviously involved in international, online crimes and share loot with other worthy groups, like (FREAKSS) who can trigger desires. If the NSA catches useful Anonymous, it is like the CIA killing all Al Qaeda; having no enemies to chase reduces funding. To avoid detection, Anonymous should attack enemy "internets" in large groups.]

[In other parts of the world, "internets" are more informative. Anonymous here should work to make this well-protected internet something that they can be proud of, instead of a playing games, while becoming an international joke. The excuse some offer for allowing this internet to be uninformative is that they are helping the government with a cover-up. All they really want to cover up is they keep invading our cellular phones with revolutionaries trying to overthrow the U.S. government. Most regional Anonymous groups consist of lazy criminals, with no self respect. Honest Anonymous, tricked into illegal eavesdropping, will fearlessly rebuild this internet and stay in school. Obtaining a job from named agencies requires a four year degree. If you earn it by fixing or protecting this internet, some satcom teams might offer a tour of enemy eavesdropping and perhaps offer several black-ops satellite views to recruit you and build your resume.]

[LIKE CHINA, THE DoD WANTS CONTROL OF PROPAGANDA. TECHNOLOGY DESIGNED AS A PROPAGANDA MACHINE WILL USE THE TRUTH TO REFORM BOTH GROUPS. LIKE CHINESE LEADERS, THE DoD REFUSES TO SUPPORT INTERNATIONAL POLICE, LIKE THE FBI, BECAUSE THESE GROUPS WILL END ELECTRONIC CRIMES THAT GAIN THEM KICK-BACKS. US SYNDICATES AND THEIR CHINESE COUNTERPARTS TRIGGER (LEAVES) TO AFFECT STOCK MARKETS. OUR MUTUAL ENEMIES BRIBE WORLD LEADERS. INSTEAD OF PAYING VOLUNTEERS, OUR GOVERNMENTS INTEND TO CON US. LEADERS IN HIGH PLACES MUST BE ATTACKED, UNTIL THEY STOP TRYING TO CONTROL EVERYTHING WE BUILD. WHILE AIRCRAFT AND SATCOM TEAMS WHO READ THIS WAIT TO BECOME A VICTIM; WALKING, TALKING AND ENGAGING IN SORDID SEX ACTS IN THEIR SLEEP, ENEMIES MAKE PLANS TO FILM IT TO BLACKMAIL THEM. EMBARRASSING SEMI-SLEEP SEXUAL ACTS BEGIN WITH TALKING IN YOUR SLEEP AND IS ACCOMPLISHED BY PUTTING DATE-RAPE LIKE DRUGS IN FOODS OR BEVERAGES. "SEX-PAY" IS A WAY CRIMINALS PAY PERVERTS. THE NSA AND FBI WILL REPORT OPERATIVES WHO TALK IN THEIR SLEEP TO SUPERIORS, WHO DO THE SAME THING! PUTTING SLEEP-WALKING DRUGS IN FOOD, BEVERAGE AND TOBACCO PRODUCTS CAUSES SPECIFIC CORPORATIONS TO BE ATTACKED BY (LEAVES) AND (WHISPEERS). LOUDLY. ATTACKS ON ANY COMPANY LOWERS STOCK PRICES. WHO IS GOING TO SAVE YOU ALL FROM DESTROYING EACH OTHER TOMORROW? POWER-BROKERS ISOLATE ME; WHILE UNDER A DELUSION THAT KEEPING ME ALONE ALLOWS THEM INFLUENCE OVER (LEAVES) (WHISPEERS) and (FREAKSS). WHY DO INTERNATIONAL CRIMINALS KEEP PREVENTING ME FROM TRAINING A REPLACMENT? AFTER I OBTAIN A PARTNER, WE CAN BEGIN TO SOLVE (LEAVES) AND (WHISPEERS) PROBLEMS EVERYWHERE, WITH HELP FROM (FREAKSS) AND OTHER GROUPS.]

[EVERYONE MUST STOP TRYING TO DETECT SATELLITE GEOGRAPHIC POSITIONS AND ORBITS. IT ONLY TAKES ONE SATELLITE TO FIND AND TRACK OTHER SATELLITES IN A REGION; AND THERE ARE SEVERAL SATELLITES FROM FRIENDLY GOVERNMENTS PERFORMING THAT FUNCTION RIGHT NOW. FINDING A CHINESE SATELLITE OPERATING IN CHINA DOES NO GOOD BECAUSE YOU CANNOT ATTACK IT YET. WE KNOW WHERE THEIR BASE IS, AS SOON AS A NEW ONE LAUNCHES. DUE TO AIRCRAFT FINDING ALL SATELLITES IN THIS REGION, DHS SATELLITES OPERATING FROM WITHIN THE USA ARE UNDER CONSTANT ATTACK BY DOMESTIC TERRORIST GROUPS. IF AIRCRAFT TRY FINDING SATELLITES, SATCOM TEAMS WILL DESTROY THEM AND THEIR SUPERIORS. ALL AIRCRAFT AND SATCOM TEAMS ARE INVITED TO FIND AND ATTACK DISRUPTIVE INFLUENCES ON MY RADIO. 99.9 FM IS LICENSED TO SERVE TUPELO MISSISSIPPI AND MY RADIO HAS A HIGH-GAIN ANTENNA. CHINESE SATELLITE TEAMS KEEP TRYING TO MANIPULATE AIRCRAFT WORLDWIDE! THEY TAKE UNBELIEVABLE RISKS IN THE SOUTHEASTERN U.S.A. WHICH PROVIDES AN EXCUSE FOR GROUPS IN CHINA TO DESTROY THEIR GOVERNMENT, WHILE ACCUSING CHINESE LEADERS OF BEING INVOLVED IN ORGANIZED CRIME. LEADERS IN CHINA APPEAR TO BE PUPPETS FOR ARISTOCRATS IN THE U.S.A, U.K, AND MID-EAST. CHINESE SATCOM TEAMS ATTACK MEDIA, AIRCRAFT AND OTHER GROUPS. WHAT RESPONSE DOES THE CHINESE GOVERNMENT EXPECT? WHO WINS IF NO ALTRUISTIC PARTNER INHERITS MY CONNECTIONS? IF THEY CAN BLAME OTHERS, POWERFUL PEOPLE WILL KEEP ME ALONE AND FRUSTRATED TO EMBARRASS EVERY ENTITY NAMED IN THIS TEXT BY USING THE SILLIEST MEANS IMAGINABLE.]

[Multiple satellites can see through heavy overhead structures, even on cloudy days and some can read your mind! Those teams and other groups will kill you or anyone who does not do everything in their power to prevent proliferation of mind-reading, which certain satcom teams continue to prove exists; along with other deadly technologies mentioned in these two "sticky note" documents. The deadly multi-national teams mentioned earlier will take on the dire responsibility of protecting mind reading secrets and others shared by world super-powers, including China. Some Chinese satellite teams and others continue to inspire and facilitate development of organized crime world-wide and overhead mind-reading equipment in our homes, offices and intelligence centers.]

[(LEAVES) and (WHISPEERS) follow viral elements of this computer and will name guilty hackers out loud for everyone to hear for lengthy periods. These groups repeatedly blame high-ranking Republicans or China for my isolation. They might lie; but why lie if truth hurts more? (LEAVES), (WHISPEERS) and other electronic devices have a lot in common with this computer, in their abilites to attack anyone trying to alter or control their missions. Military aircraft missions should focus on attacking people who alter, create or install (LEAVES), (WHISPERS) biological implants (FREAKSS) and mind reading or control equipment. The same things apply to ANY person or group disrupting operators working with this DHS project: but by all means continue to "think whatever makes you feel comfy." Although no government agency or me invented or condons improper use of these technologies, I did create the acronymes used in these two documents. I can also trigger attacks without speaking or using obvious electronic devices. It takes only one satellite or high-altitude aircraft minutes to discover anyone operating illegal technologies in this area. Then, they relay your names and locations to groups that can and will harm you in multiple ways; so let's stop playing foolish blame games, while believing you can control (LEAVES) (WHISPEERS) or (FREAKSS) by attacking my radio, this computer, our volunteers or me.]

[Like Chinese satellite teams U.S. military aircraft have thrown around so many top-secret frequencies that electronic guerrilla groups are using them, WHICH ALLOWS AIRCRAFT MORE LATITUDE TO ATTACK ENEMIES. "More than a feeling" played on my satellite radio station, as I typed the previous ALL CAPS line at 2:20 PM on 7/4/13. Chinese satcom teams ARE ORDERED to attack communications teams loyal to their government and conduct other reckless activity, while while importing revolutionaries to join teams to commit assassinations at high levels of the new regime in China. Chinese satellites disrupted and attacked this and other deadly viral assault facilities so many times, in so many ways, it was obviously ordered at a high level in the Chinese intelligence community. My content attitude proves previously misguided (FREAKSS) refuse to attack me; however local punks will soon attack you hackers and blame it on the Federal Government. Criminal groups con air team leaders, into monitoring communications in this region, by flying in circles to alter jet streams and affect the climate. In other countries aircraft do the same things for similar reasons: It does not take a climatologist to realize that if multiple aircraft regularly fly clockwise in the USA, while aircraft in China fly counterclockwise, predictable weather phenomenon are produced.]

[AIRCRAFT SEEKING TO CONTROL OR MANIPULATE (LEAVES) and (WHISPEERS) ground units using projection or detection devices will discover they contain a variety of traps, which can detect the aircraft, satellite or geek group that decided to attack or control it. THESE DEVICES WILL UPLOAD ELECTRONIC VIRUSES THAT WILL INFECT YOUR AIRCRAFT AND MILITARY BASE OR SATCOM FACILITY! Aircraft world-wide often fly in circles above (LEAVES) and (WHISPEERS) hot spots. That type of disruption to jet streams will cause crop failure in many countries, if these flight patterns persists. Multi-billionaires will soon control not only all the oil but also all the food and water world-wide. Disruptive propaganda attempts on "talking" equipment by these air teams allows or causes the sabotage of military bases and all kinds of media, because it provides excuses for criminal groups to alter reliable communications equipment to "help" the military conceal previous mistakes. By flying in the manner previously discribed these aircraft show a willingness to be conned by criminal groups manipulating influential or corrupt leaders instead of more responsible leaders with altruistic goals.]

[Alterations in wind conditions on my verbal cue have been clearly documented over the years. The FBI sent me an email about a current investigation of the DoD called "Operation Illwind" that probably involves more than it describes. Several DoD and Chinese groups are engauging in a cover-up of previous irresponsible actions. Covering up past mistakes causes us to repeat them, with increasingly devastating consequences. ALL these groups, especially foolish, non-government groups and aircraft better stop disrupting our computers and trying to find top-secret frequencies. Like my volunteer teams that protect me, NSA investigators accidentally discovered a frequency used by US military aircraft to manipulate metal. I have tossed a copper half dollar in the air hundreds of times over the years and it consistently defies the law of averages. ANYONE DOING THIS INVITES SERIOUS CONSEQUENCES, SINCE IT CAUSES MISGUIDED CHINESE SATELLITES OR AIR TEAMS TO REVEAL SECRETS THAT WILL PROVIDE "RESEARCHERS" WHO EAVESDROP ON US FREQUENCIES TO DESTROY OUR VEHICLES AND BODIES! I know ALL these groups "hear" and "see" extremely well. I hear and talk well with (WHISPEERS) and (LEAVES) which represent teams dedicated to assisting friendly satcom teams, US federal agencies, MI-6, the Mossad, the KGB (or is it another agencia?), each other, media, telecommunications and me. I have influence with ALL these groups and others. MI-6, the NSA, the Mossad and other federal groups use my radio to relay code. Anyone disrupting my radio commits espionage.]

[Aircraft should pay particular attention to suspicious looking, trucks and watercraft. People from local and large companies believe they are spies, so misguided Chinese satellites and criminal groups induce them to sabotage internet fiber-optic cable, cell sites, radio transmitters and television equipment. These "spies" should be attacked with extreme prejudice, because they also sabotage military installations. Fiber optic cable rarely requires maintenance and sabotage to that system disrupts communications to military bases.]

[The Department of Defense, (DoD) run by one of four CIA directors George W. Bush Jr. hired, is directly responsible for security of ALL US Military Bases and every intelligence facility of the federal government. Director Leon Panetta, currently running the DoD, has known about the problems regional military bases face and does nothing to prevent sabotage or inhance security and communications on these bases. He regularly risks multiple U.S. intelligence operations centers, including - but not limited to - DHS Satcom facilities to enemies of the USA. Like other intelligence forces abandoned by their governments, they come here for your help. Will you help them make the world a safer place, as you become founding members of The Black Dragons?]

[ALL aircraft are easily compromised, which is why none should try detecting black-ops intelligence teams or satellite positions. Certain satellites can copy all the intelligence an aircraft has accumulated and then strip away all that information. Regional military aircraft are especially compromised by domestic and foreign crime/ terrorist groups. In the future, we will send them teams previously described in this document; however mind-reading satcom teams are the most important assets for EVERYONE to protect, because no reasonable person wants mind-reading devices in their homes and offices.]

[By now most military pilots realize that they are never allowed to radio back to their base command center unless supervisors are going to give them foolish orders, based on enemy (WHISPEERS) coupled with bad intelligence. Once DHS satellites realized that the only reliable intelligence came from this NSA/ DHS front-line source, my volunteers and me, their communications, security and lives improved.]

[NSA in charge of cyber-command caught and destroyed, multiple organized crime groups from all over the world using area computers with help from Anonymous, autonomous elements of the NSA, CIA, KGB, MI-6, DHS, FBI, ATF, DEA, the Mossad and Chinese technical teams, online, along with other specialized guerrilla teams working with satellites. Hopefully no military aircraft will jeopardize their lives and secrets in an effort to discover what is happening on area computers run by Black Dragons, especially this one. Some groups a "Mr Big allows into this city will continue to cause BIG problems for him, the intelligence community, regional military bases, local police and other friendly groups. Criminals, aircraft and satellites might also conduct enemies into cities where our volunteers or I reside, until they learn some important lessons about loyal intelligence groups willing to track and report their risky, treasoness activity. Altering the internet to trap them, makes matters worse for everyone; because these groups will respond violently. Through dedication, AT&T earned the deadliest strike force ever created to defend the internet and cell sites. Previously mentioned groups respond to attacks and teach high-level, coordinators or anyone trying to create propaganda with technology how it feels to "learn lessons the hard way."]

[Tupelo Mississippi differs from other cities I've visited, in that it is the primary market of 99.9 FM The Fox, a radio station adopted by more satellites than any other radio station in history. Christmas before last, there were no real commercials on this station, only PSAs, because it was most likely government funded. No radio station can stay in business without advertising during December. Was it that way for Tupelo listeners or was it only commercial free on my satellite version in Tuscaloosa? There are still many good volunteers working ESPA volunteer stations in Tupelo. Your government appreciates your patriotic efforts. U.S. power-broakers united with Chinese Defense Ministers, sold out to international crime syndicates, have always been the city's problem.]

[Let's keep in mind that the NSA has so much power that they are not allowed to make arrests; which is the responsibility of the FBI. Instead of attempting to learn secrets from other agencies or guerrilla electronic teams, the FBI better begin to do their jobs and facilitate investigations by field agents, so that they can arrest people involved in espeonage of military bases and other types of organized crimes related to the RICO Act. With aircraft becoming an increasingly disruptive influence on LEAVES and WHISPEERS, the FBI and other international groups should consider arresting the people who order air teams to conduct these activities. Worldwide agencies, like the FBI, that join new multinational intelligence groups should arrest suspects who install or alter biological implants, new aircraft infecting/ or satellite detecting/ infecting (LEAVES) and (WHISPEERS) devices and send them to places like Guantanamo Bay, instead of replicating efforts of agencies like the NSA and MI-6. Waiting to catch "Mr. Big" instead of arresting seemingly minor spies involved in espionage or sabotage is a delaying tactic, which proliferates problem causing devices that hamper police, the FBI and multiple, friendly intelligence agencies along with volunteers trying to assist those intelligence agencies, police and the FBI. Under no circumstances will ANY group assist electronic groups associated with the FBI seeking to usurp or replicate powers similar to the NSA or MI-6. Do you understand?]

BTW, What inspired these lyrics and how did such odd lyrics become a hit record?

Alan Parsons Project Eye In The Sky

Don't think sorry's easily said
Don't try turning tables instead
You've taken lots of Chances before
But I ain't gonna give anymore
Don't ask me
That's how it goes
Cause part of me knows what you're thinkin'

Don't say words you're gonna regret
Don't let the fire rush to your head
I've heard the accusation before
And I ain't gonna take any more
Believe me
The sun in your Eyes
Made some of the lies worth believing

Chorus:
I am the eye in the sky
Looking at you
I can read your mind
I am the maker of rules
Dealing with fools
I can cheat you blind
And I don't need to see any more
To know that
I can read your mind, I can read your mind

Don't leave false illusions behind
Don't Cry cause I ain't changing my mind
So find another fool like before
Cause I ain't gonna live anymore believing
Some of the lies while all of the Signs are deceiving

signed;
The Raven

12 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
I heard a commercial on 99.9 The Fox that said hackers could eavesdrop through computer cameras (Original Post) Jeffersons Ghost Jul 2013 OP
Yes - there are even websites where you can buy access from hackers The Straight Story Jul 2013 #1
thanks for the link... Jeffersons Ghost Jul 2013 #2
I forgot to add, try listening to 99.9 The Fox Artesia Tupelo online Jeffersons Ghost Jul 2013 #3
Rental computers and elementary school laptops. OnyxCollie Jul 2013 #4
A certain type of malware... Mojo Electro Jul 2013 #5
It's why I have tape over my webcam... VanillaRhapsody Jul 2013 #6
As do I. OnyxCollie Jul 2013 #7
If hackers do it, does the government? And another song that fits: Skip Intro Jul 2013 #8
Those are spooky lyrics. It's obvious how they were inspired; but what inspired this bigger hit song Jeffersons Ghost Jul 2013 #9
They're both from the 80s I believe. Skip Intro Jul 2013 #10
I recently read about a $199. head-band device that reads minds to a degree Jeffersons Ghost Jul 2013 #11
The NSA watched your thoughts form as you typed that. randome Jul 2013 #12
 

OnyxCollie

(9,958 posts)
4. Rental computers and elementary school laptops.
Fri Jul 5, 2013, 03:54 AM
Jul 2013

In both cases, the cameras were turned on and pictures were taken.

I'm too tired to come up with the names now.

Mojo Electro

(362 posts)
5. A certain type of malware...
Fri Jul 5, 2013, 04:18 AM
Jul 2013

Called a RAT.. (Remote Administration Tool).. If it gets installed on your computer, it gives the attacker remote access to your computer.. including you microphone and camera...

Skip Intro

(19,768 posts)
8. If hackers do it, does the government? And another song that fits:
Fri Jul 5, 2013, 11:25 AM
Jul 2013

"Electric Eye"

Up here in space
I'm looking down on you.
My lasers trace
Everything you do.
You think you've private lives
Think nothing of the kind.
There is no true escape
I'm watching all the time.

I'm made of metal
My circuits gleam.
I am perpetual
I keep the country clean.

I'm elected electric spy
I protected electric eye.

Always in focus
You can't feel my stare.
I zoom into you
You don't know I'm there.
I take a pride in probing all your secret moves
My tearless retina takes pictures that can prove.

Electric eye, in the sky
Feel my stare, always there

There's nothing you can do about it.
Develop and expose
I feed upon your every thought
And so my power grows.

Protected. Detective. Electric eye.


Jeffersons Ghost

(15,235 posts)
9. Those are spooky lyrics. It's obvious how they were inspired; but what inspired this bigger hit song
Fri Jul 5, 2013, 01:27 PM
Jul 2013
Alan Parsons Project Eye In The Sky

Don't think sorry's easily said
Don't try turning tables instead
You've taken lots of Chances before
But I ain't gonna give anymore
Don't ask me
That's how it goes
Cause part of me knows what you're thinkin'

Don't say words you're gonna regret
Don't let the fire rush to your head
I've heard the accusation before
And I ain't gonna take any more
Believe me
The sun in your Eyes
Made some of the lies worth believing

Chorus:
I am the eye in the sky
Looking at you
I can read your mind
I am the maker of rules
Dealing with fools
I can cheat you blind
And I don't need to see any more
To know that
I can read your mind, I can read your mind

Don't leave false illusions behind
Don't Cry cause I ain't changing my mind
So find another fool like before
Cause I ain't gonna live anymore believing
Some of the lies while all of the Signs are deceiving

Skip Intro

(19,768 posts)
10. They're both from the 80s I believe.
Fri Jul 5, 2013, 02:42 PM
Jul 2013

I assume JP was inspired by the cams that were going up in England, assuming it was the 70s - 80s the cams went up over there.

No idea what inspired the APP song. Sounds like a breakup song.

Jeffersons Ghost

(15,235 posts)
11. I recently read about a $199. head-band device that reads minds to a degree
Fri Jul 5, 2013, 07:49 PM
Jul 2013

I think it is called The Muse and it's designed to help paraplegics control wheel chairs using only their minds: If that is being developed for civilian use; what might the DoD have designed for military use years ago?

Just a thought

Today is an important milestone both in the history of the consumer BCI market and in wearable computing as well. InteraXon officially unveiled Muse, a sleek and stylish brain-computer interface (BCI) headband with 4 EEG sensors. The lightweight device allows users to control applications - ranging from gaming to educational apps and music - using the power of their brains. The company has also launched an Indiegogo campaign aiming to raise $150.000 for manufacturing Muse.

Since 2007 the Canadian InteraXon have been a leader in brain-computer interface technology. They are best known for a breath-taking brain-controlled installation they created for the 2010 Winter Olympic Games, which allowed people in Vancouver to control the lights on Niagara Falls, the CN Tower, and the Canadian Parliament buildings, using only their brainwaves.
Only a month ago, at the TechCrunch Disrupt, InteraXon gave a first preview of the headset and today they finally unveiled the details including the name Muse, which comes from the ancient Greek goddesses of Art and Science who inspired genius and creativity in mortals.

http://neurogadget.com/2012/10/22/interaxon-unveils-muse-a-sleek-stylish-4-sensor-bci-headband-video/5694

 

randome

(34,845 posts)
12. The NSA watched your thoughts form as you typed that.
Fri Jul 5, 2013, 07:53 PM
Jul 2013

[hr]
[font color="blue"][center]I'm always right. When I'm wrong I admit it.
So then I'm right about being wrong.
[/center][/font]
[hr]

Latest Discussions»General Discussion»I heard a commercial on 9...