The Surveillance Nuts and Bolts of the Phone Network

Sdílet
Vložit
  • čas přidán 12. 03. 2024
  • How does the phone network work? Who can see your data? Who can listen to your calls or read your SMS? Who can examine who you call or who calls you? What meta data is collected? What about your internet actions? How much of that can be seen by third parties? Who are the possible third parties? What about VOIP/SIP?
    This is a deep dive into the architecture of the Public Switched Telephone Network (PSTN). A system that Kevin Mitnick, master hacker has attacked for so many years because he understood it so well. Now I will let you understand it too.
    -----------------------------------
    BraxVirtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up.
    -----------------------------------
    Merch Store
    my-store-c37a50.creator-sprin...
    -----------------------------------
    I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
    I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
    Support this channel on Patreon! www.patreon.com/user?u=17858353
    Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
    brax.me Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
    bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing
    whatthezuck.net Cybersecurity Reference
    brax.me Privacy Focused Social Media - Open Source
    Please follow me on
    Odysee
    odysee.com/$/invite/@RobBraxm...
    Rumble
    rumble.com/c/robbraxman
  • Věda a technologie

Komentáře • 153

  • @hammingdad1
    @hammingdad1 Před 2 měsíci +16

    Fantastic job, Rob. I have been employed in IT and telco for 30 years. Everything I have learned in 30 years, Rob Braxman already knows. 73.

  • @hobofoshitsho8999
    @hobofoshitsho8999 Před 2 měsíci +3

    That's not an acronym, sir. It's an initialization. Acronyms are spoken as a word that the initials create. The abbreviation or initialization you referenced isn't spoken as a word, you're speaking the letters individually.
    You're teaching me so much, I felt like I need to give back. ;)

  • @geraldwest3428
    @geraldwest3428 Před 2 měsíci +19

    This dude is pure badass! Thank you! 😊

  • @dude_man_bro
    @dude_man_bro Před 2 měsíci +9

    You've quickly become one of my favorite channels

  • @JasonStrange-jj8mr
    @JasonStrange-jj8mr Před 2 měsíci +5

    The only reason why I don't mind my phone and computer being monitored is because some very bad people try to set me up on false charges here in Wichita Kansas. They were the police and government of Wichita Kansas that did it because of a lie that my wife told them.

  • @RotcivVanDahl
    @RotcivVanDahl Před 2 měsíci +12

    Great video as always, Rob!!! Thanks

  • @Heartwing37
    @Heartwing37 Před 2 měsíci +56

    Just because you’re living your life and not doing anything wrong today doesn’t mean the laws won’t change tomorrow and you will be the outlaw!

    • @babajaiy8246
      @babajaiy8246 Před 2 měsíci +6

      ....the reverse is also true.

    • @maw9916
      @maw9916 Před 2 měsíci

      Just did today... They passed the tik tok bill and it'll be passed in the Senate, just sometime for' miss information control...ie. rumble and any other website they'dems' deem against national security

    • @sharonison3829
      @sharonison3829 Před 2 měsíci +2

      1:08 please help me I've been asking you for help for so long and you will not help me I am being slam-dunked and rolled over by somebody and I cannot get rid of him it's been three and a half months and I don't know what to do I've lost every freaking thing to my name I can't even have banking or any of my apps on

    • @joshfixall7938
      @joshfixall7938 Před 2 měsíci +2

      U got anymore details brother

    • @StarsManny
      @StarsManny Před 2 měsíci +3

      Exactly. If you leave a comment somewhere that's considered ok by today's standards, in 10 years time your comment might be considered wrong and be enough to get you fired.

  • @ScorpionCar
    @ScorpionCar Před 2 měsíci +11

    Thank you Rob for more detail on this subject with phones! 👍

    • @BillAnt
      @BillAnt Před 2 měsíci +4

      Yep, can't trust any system like phone or VPN's with their so called "No-logs, trust me bro!" promise. Riiiiiight! lol
      Actually you're better off connecting to HTTPS sites directly which are already encryoted, thus spreading out the chance of being surveilled on a single VPN server.

    • @ScorpionCar
      @ScorpionCar Před 2 měsíci +3

      @@BillAnt Indeed! Actually laughed so hard when you mentioned "No-logs, trust me bro!" 😆 It's crazy how most VPN companies are the same with different coats of paint. Also something to point out is that the second you use a VPN service, most people assume you have something to hide.

    • @BillAnt
      @BillAnt Před 2 měsíci

      ​@@ScorpionCar - As you've mentioned using a VPN usually raises flags, and even some streaming websites are even blocked
      Also, it's a huge target for hackers and governments since all your traffic is funneled through a single central server. Before HTTPS, VPN''s were somewhat useful, but not so much anymore except for hiding your IP. "Trust me bro!" lol

    • @billant2
      @billant2 Před 2 měsíci

      @@ScorpionCar - As you've mentioned using a VPN usually raises flags, and some streaming websites are even blocked
      Also, it's a huge target for hackers and governments since all your traffic is funneled through a single central server. Before HTTPS, VPN''s were somewhat useful, but not so much anymore except for hiding your IP. "Trust me bro!" lol

    • @billant2
      @billant2 Před 2 měsíci +3

      @@ScorpionCar - As you've mentioned using a VPN usually raises red flags, and some streaming services are even blocked it.

  • @user-dy2lw9xq3y
    @user-dy2lw9xq3y Před 2 měsíci +1

    I’m a senior and need professional advice and services on my phone. Glad to see your branching out!!

  • @kimberleebrackley2793
    @kimberleebrackley2793 Před 2 měsíci +8

    Every time your site comes to me, l listen. I do not know ANYTHING about the meat of what you are showing me, us. Yes, my first thought was, if you're not you doing anything wrong you have nothing to hide. This is much more, seriously more. I don't want to help the creeps of the world hide what they're doing, especially when I, myself, is being stalked. Freedom is even more important because we are loosing our rights far more quickly than it took to GET them. People gave their own life to give us the freedoms we've had. Major cudos to this site for the reigning in of the intrusive gov, hold it HAS of us. You know ONLY what you've been exposed to. HA l wish I knew half of what you were talking about. But, l won't Facebook, twit, l hate the intrusive scammer still texting me. Thank you Braxton

  • @nothinhappened
    @nothinhappened Před 2 měsíci +4

    Did you know that they could use old tube TVs to listen in by inverting the speakers to be crude microphones? If you've ever plugged earphones into the mic plug and spoken into them to hear how bad they sound you'll have an idea how it must have sounded. Wasn't done 24/7 but it was totally a thing

    • @BillAnt
      @BillAnt Před 2 měsíci +1

      Ah yeah, I head it back in the tube days that "the TV is spying on you!". lol
      And if you put on a tin-foil hat, you could even talk to satellites. Ba-ha-ha

  • @arnoldoree
    @arnoldoree Před 2 měsíci +2

    Really appreciating the insights and advice.

  • @markvylonis
    @markvylonis Před 2 měsíci +4

    Thanks Rob !

  • @jakemelinko
    @jakemelinko Před 2 měsíci +1

    Thank you so much, Rob

  • @richardb4787
    @richardb4787 Před 2 měsíci +2

    That little dot next to the camera, on my android phone, how do I turn it off? I heard it's spying on me. I went through the settings to turn off location, but there's still that dot.

  • @rafal5863
    @rafal5863 Před 2 měsíci +4

    They don’t want you know that they see all.
    This is good for intelligence agencies. Bad bad for people with court subpoenas.
    One needs to have clearance in most countries to work on nodes that relate to “legal intercepts”.
    The reason for this is to keep potential criminals (ie people) naive of this fact and conduct sensitive communication over their equipment.

  • @audreychurch7759
    @audreychurch7759 Před 2 měsíci +1

    Thanks much for helping me to learn

  • @kennethgarland1021
    @kennethgarland1021 Před 6 dny +1

    Thank You !

  • @2117david
    @2117david Před 2 měsíci +2

    Thank you

  • @robinwells8879
    @robinwells8879 Před 2 měsíci +5

    I am a bit politically vociferous on this platform (and others) and I had an interesting experience a couple of weeks ago. I went to dinner with old work friends in London near parliament. Towards the end of dinner one of the occupants of the neighbouring table came up in the form of a pretty young woman and said “my friends and I have been trying to decide how you all know each other! Tell me how you know each other”? Of course my friends responded to the pretty lady despite the bizarre approach. Having told them our association I asked, and what do you all do? Oh we work for the MET Police! I guess they just wanted me to know they were watching me being so close to parliament. 😂

    • @terrydaktyllus1320
      @terrydaktyllus1320 Před 2 měsíci +6

      The first mistake you made was not asking her to reveal who she was first before telling her all about you - then not tell her about you anyway.
      Met. Police or not, we are "policed by consent" in the UK and we can politely tell anyone to go away if they ask questions we don't need to answer when going about our daily business as private citizens.

    • @lindenh2014
      @lindenh2014 Před 2 měsíci +4

      And I would add: never be afraid to question a question. Never give a face an automatic pass just because it is pretty. Protect yourself at all times.

  • @realmstupid-on8df
    @realmstupid-on8df Před 4 dny

    There Is a difference between not hiding anything and privacy

  • @josephsaleh7433
    @josephsaleh7433 Před 2 měsíci +4

    Operation blue beam

  • @MsHojat
    @MsHojat Před 2 měsíci +4

    Good summary video. You've gone over this sort of stuff before, but I think it takes multiple times for most people to fully understand it all.
    The thing I hate most if how other people's contact lists can be obtained, and there's nothing we can do about it. Of course they still need to make guesses that the name on the contact list is the right one, and/or to link that name to a known name they have on their system (due to a purchase or something, assuming real names were used)

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +3

      I'm sure your friends aren't going to use a fake name on you. LOL. But I suppose it could be a nickname

  • @linsqopiring6816
    @linsqopiring6816 Před 2 měsíci +4

    Mr Braxman, I think it's a great idea to give an overview of all these concepts and terms kind of as a primer so that when explore things in more fine detail in future videos it will be easier to understand. A question for you. You said that CALEA governs USA law enforcement only. But do USA LEOS get data from people in other countries because
    of routing through USA systems, and do they share this data with LEOS in those other countries?

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +6

      Some 3 letter agencies focus on International data. You know which. Whether they share it or not is another question. Just assume it takes extra steps

  • @DOUBLE0SEVUN
    @DOUBLE0SEVUN Před 2 měsíci +3

    What is you use *67 to make a private call? I’m assuming it only makes it private for the person being called but the the people in the middle?

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +7

      No such thing as a "private call"

    • @linsqopiring6816
      @linsqopiring6816 Před 2 měsíci +2

      @@robbraxmantechWould Braxphone to Braxphone avoid the PSTN and thus be private?

  • @jamesfrederick6914
    @jamesfrederick6914 Před 2 měsíci +3

    Bravo

  • @elizabethandiosa4579
    @elizabethandiosa4579 Před 2 měsíci +2

    Awesome. Unfortunately, this day and age, we have to protect ourselves from con, the envious the deceitful, nefarious unethical business and quite often the violent ex. Its a process. ✌️🇨🇦🙏🥰😊

  • @00Klingon
    @00Klingon Před 2 měsíci +1

    When it comes to encrypted messaging apps, is there a danger with push notifications of giving away the contents of at least part of the message to the carrier on your phone? Does turning off notifications on the phone OS stop this or does the notification still get pushed to the phone regardless, if the phone displays a notification or not?

  • @coldbrew6104
    @coldbrew6104 Před 2 měsíci

    11:14 virtually all email is encrypted nowadays with TLS over SMTP, so the only concern there with your privacy is that your email provider CAN see your emails going out and coming in.

  • @pauberrymon5892
    @pauberrymon5892 Před 2 měsíci +6

    Surveillance has been around since the telegraph system, Comms have never been "private".

    • @user-yy9io7wu8t
      @user-yy9io7wu8t Před 2 měsíci +2

      I agree 💯

    • @Modded
      @Modded Před 2 měsíci +2

      That doesn't excuse it.

    • @Sayonara301
      @Sayonara301 Před 2 měsíci +1

      I hv been bulied and manipulated at the work place for many years.

    • @tenacity3152
      @tenacity3152 Před 19 dny

      ​@@Sayonara301
      Praying for you
      For healing❤
      Praying to Jesus Christ.❤

  • @kptechnologyservices4696
    @kptechnologyservices4696 Před 2 měsíci +1

    What about MTA-STS? would that not protect email if both the sending and receiving domain implement it and have valid TLS certificats on their MTAs?

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci

      There are many ways around that, especially with concurrence of the parties or forced by the State (intermediate proxy, root cert, etc). Be assured that someone can read it

    • @AndersHellquist
      @AndersHellquist Před 2 měsíci

      What parties issued the certificates? Can they be trusted and not being in bed with other parties?

  • @transmitterguy478
    @transmitterguy478 Před 2 měsíci +4

    Rob, I may have missed it but can my iphone be tracked if it is powered off? Excellent videos, thanks.

    • @jakemelinko
      @jakemelinko Před 2 měsíci +3

      Absolutely

    • @BillAnt
      @BillAnt Před 2 měsíci +4

      Starting with the iPhone 11 and newer, they all have a U1 Ultra Wideband chip which is always on even when the phone is turned off. It's primary function is to be able to find your phone via Find My iPhone service even when the phone is off. The only way to disable it is by disconnecting the battery.

    • @JINGWA64
      @JINGWA64 Před 2 měsíci +5

      why do you think they decided making it easy to pull out your battery wasnt in their interest, because to many people would pull out the battery when they wanted some privacy, so they changed the design with increased complexity and increased manufacture costs so even if you can be bothered to spend the time to pull apart your phone, by default its designed to make something break if you keep doing it, to discourage anyone even considering it.
      one reason wireless charging was also introduced, is because even if your battery is flat, you can with a directed EMF remotely provide enough power to ping a phone, again a phone costs more to design and manufacture with wireless charging, they didnt do it for your benefit in mind, they want all devices and objects to be trackable even when the battery goes flat or you unplug it from the wall and likewise have the capacity even when its just the shirt your wearing, so some cloths do indeed have integrated RFID these days.
      so most people still dont realize passive RFID has been incorporated into almost everything these days and used for decades within public ignorance for tracking,, again even car tires these days. so it doesn't actually do anything by default as its passive, but just like your tap and go, when its introduced the correct EMF it powers the circuit and depending on its design it can function as receiver or a transmitter or both, or just provide location tracking + a unique ID code, so it can be mapped on a global database and location map each time its picked up and a persons name(id code)
      in reality the range on RFID can be activated is very large, depending on the circuit design... people can infact scan the cards in your wallet from several meters, just using a card scanner in a backpack with a upgraded scanner, likewise certain RFID can be tracked from several KM away.
      again think how small your phones antenna is, how little power it needs to work and by default it can do 15+km in optimal conditions, your sat phone with a slightly larger antenna and the same battery through less dense atmosphere can do 30,000+ km. so if you reduce the antenna size, it will reduce its range and efficiency, but when you can already go so far on such little antenna and power input, you can see how easy it is to sneakily add a passive circuit to a device that easily blends into the circuit or object, but when exposed to the correct EMF will self power the circuit and transmit a signal just like passive RFID, but much much further range then you realized.
      if you gut your phone, so its just the antenna and power circuit needed to do a location ping, your battery aint going to go flat for long time, since it uses so little power to do this, again its why when they put a active tracking device on your car, it can keep tracking you for months before it goes flat.
      most tech out the bag is restricted on its range and output, which gives the illusion the tech cant do certain things when it most certainly can and some for good reasons, as signals can and do interfere with each other, without any restrictions, it would become just interference and most wireless stuff wouldnt work properly in result.
      and humans also function like Active and passive RFID, simply put every human transmits their own unique EMF field, just like a walking omni directional antenna, this is by no means hard to detect either, they have been experimenting with wireless thought detection for over 100 years, so you dont need to wear a device to be able to control another device, you just need to be in its receiver range, they never had any issues picking up these human thought waves remotely, it just made more sense to put the receiver on your head, because then its more sensitive, you get less interference and a better signal which is useful when your trying to decipher those thought waves, but again in reality it can be all done remotely without your knowledge or awareness, how far exactly? im not sure, but at the very least 30+ meters, it also depends on the brain wave and freq, some travel significantly further then others and emotional and physical state can also effect this as well.
      food for thought.

  • @louishurr393
    @louishurr393 Před 2 měsíci +2

    Is SMS texting using a virtual phone service like MySudo or others suitable to avoid personal data collection?

    • @BillAnt
      @BillAnt Před 2 měsíci +4

      "Signal" is the only de-centralized and encrypted service which is trusted by most security professionals.

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +4

      Did the video make special exceptions? NO

    • @louishurr393
      @louishurr393 Před 2 měsíci

      @@BillAnt Completely agree Signal is the way to go. However, I face the dilemma of everyone in my life using iMessage because it’s the “default”. So if I want to use Signal with a de-Googled phone, AND continue to communicate with iMessage family and fiends I am also forced to carry an iPhone because MOST of them will not use Signal. They just don’t care. They would rather just let my texts default to “green bubbles” because they don’t care. It’s a real conundrum for me that I’ve been struggling with for two years now. That’s why I was hoping maybe SMS over a virtual phone number could be a solution. Dunno.

  • @anjanbora7943
    @anjanbora7943 Před 21 dnem

    Papa u r a genius 😎

  • @paulmitchell4421
    @paulmitchell4421 Před 2 měsíci +2

    stingray is from the 3g era

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +3

      there's a 4G version with another sea creature name. Can't remember. So Stingray is generic as an IMSI catcher

    • @itrytobeanonymoustoo5289
      @itrytobeanonymoustoo5289 Před 2 měsíci +1

      @@robbraxmantech Kraken?

  • @lilcas114
    @lilcas114 Před 2 měsíci

    I have a question.. There is an sms attacker always texting me from different numbers.... He knows a lot about me. Do you have any idea how they're doing this? because they're able to use any area code they want to. Watching your video makes sense about how they're doing this....

  • @joetrott6115
    @joetrott6115 Před 2 měsíci +2

    When I try install from Google play I am told my device is not compatible as this program is for an older version Android. I'm currently on 10

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +2

      You can just use the browser or download the app from brax.me/braxme.apk or use apkpure.com

  • @Aomicplane
    @Aomicplane Před 2 měsíci +2

    I don't even use cell services. I use meshtastic

  • @remussatala
    @remussatala Před 2 měsíci +2

    Don't you think you confuse surveillance with the possibility of surveillance sometimes? What do you have to say about the confusion between surveillance and the possibility of surveillance?

    • @waterdesign9573
      @waterdesign9573 Před 2 měsíci +1

      Yeah I guess I can understand what you mean. Needs to be a bit better with wording.

    • @jakemelinko
      @jakemelinko Před 2 měsíci +2

      The possibility of it means it's not necessarily proven, but you can count on the fact that there's way more going on than we know for sure.

    • @jakemelinko
      @jakemelinko Před 2 měsíci

      If you want more of a grasp of the weaponized surveillance taking place, see Lookout fa Charlie

  • @Baatipari
    @Baatipari Před 13 dny

    Can you still use these phones for two factor?

  • @Tad-zh4wr
    @Tad-zh4wr Před 2 měsíci +3

    The rules that Trump sadly repealed would have required internet service providers - including Comcast, Verizon and AT&T - to obtain permission from customers before sharing personal data like their web-browsing history. The rules were aimed at preventing internet providers from selling that data without permission. What Trump did was bad for our privacy.

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +4

      Just so you understand, carriers don't really see web browsing. They only see DNS. Sometimes. And this is taken away too by Apple private relay, and Google's private DNS. So basically carriers mostly see just encrypted traffic. They have no real data. Now the real problem is that now you are saying ban carriers from collecting data, while allowing Google, etc to get all the data. Does that make sense? Shouldn't it be evenly applied to all data collectors?

    • @Tad-zh4wr
      @Tad-zh4wr Před 2 měsíci

      You are correct. What Trump did was bad. Both are true. Thanks.

  • @rachest
    @rachest Před 2 měsíci +1

    Rob, how can I chat with you?

  • @sharonison3829
    @sharonison3829 Před 2 měsíci +1

    0:48

  • @steffybael1245
    @steffybael1245 Před 2 měsíci +1

    i think he said it was called unplugged?

  • @sharonison3829
    @sharonison3829 Před 2 měsíci +1

    2:31

  • @Tad-zh4wr
    @Tad-zh4wr Před 2 měsíci +1

    Facebook, cell phones.

  • @MrDormant
    @MrDormant Před 2 měsíci +3

    pen and note pad ready

    • @linsqopiring6816
      @linsqopiring6816 Před 2 měsíci +1

      lol me too.
      Perhaps we should put our note files in youtube comments so other people can copy paste.

    • @MrDormant
      @MrDormant Před 2 měsíci +2

      @@linsqopiring6816 i just have notebook always at hand. Usually just write keywords I don't know and come back to it later. As of now just intaking all info I can to later make a threat model I can stick too. I tried going all in and failed. So doing it this way.

  • @luyzqint3760
    @luyzqint3760 Před 2 měsíci +7

    Hello, I would like your take on duckduck browser's app tracking protection. ✌️

    • @dc174
      @dc174 Před 2 měsíci +3

      @luy.....me too!

    • @waterdesign9573
      @waterdesign9573 Před 2 měsíci +5

      Im pretty sure duckduckgo was caught selling data to microsoft

    • @luyzqint3760
      @luyzqint3760 Před 2 měsíci

      @@waterdesign9573 Have you ever used it?

    • @joshfixall7938
      @joshfixall7938 Před 2 měsíci +3

      I believe they had to because they use Microsoft servers to make their service work. (Doesn't mean it's fine , but I believe they gave limited information, it depends what you give them)

    • @JonnyParker-
      @JonnyParker- Před 2 měsíci

      people stopped using duckduck ages ago just as firefox. Stuff like presearch , startpage, mojeek are other alternatives.

  • @torquethetalk
    @torquethetalk Před 2 měsíci +1

    let me know what you think about solchat?

  • @ayupmeduck5708
    @ayupmeduck5708 Před 2 měsíci

    Will disconnecting my router protect me from being jigsawed to any visitors I have that have tracking devices? Does disconnecting my router make me invisible to visitors devices?

  • @weekendwarrior3420
    @weekendwarrior3420 Před 2 měsíci +2

    Google draws its power from the greed of people who want free sh.t. Poisoned food -> poisoned fruit.

  • @wadepatton2433
    @wadepatton2433 Před 2 měsíci

    Does he sell "Linux" phones any more? Anybody use one? Or are they all CalyxOS? Blogs are not my normal operating mode, but that's all I can find. Where can I find a walk-through of CalyxOS? I just want a phone without bloatware.

  • @mwngw
    @mwngw Před 2 měsíci +1

    Rob....have you ever been "visited" by an employee or contractor of a 3-letter government Agency?

    • @terrydaktyllus1320
      @terrydaktyllus1320 Před 2 měsíci +3

      Probably not... nor will he have been abducted by aliens either... before you ask.

    • @robbraxmantech
      @robbraxmantech  Před 2 měsíci +4

      I already announced in a live stream that I have never had such an encounter on any platform I run

  • @RotcivVanDahl
    @RotcivVanDahl Před 2 měsíci +4

    Rob, I can hide anywhere! 😂

    • @terrydaktyllus1320
      @terrydaktyllus1320 Před 2 měsíci +3

      Not if that's your real name that you are using on here.

  • @miketurgeon5506
    @miketurgeon5506 Před 2 měsíci +1

    Hi Rob. Is gubment harassing you b/c of your knowledge and info to masses?

  • @crimestoppers1877
    @crimestoppers1877 Před 2 měsíci

    Your statement at 7:32 is not accurate. It is not uncommon for wireline and non wire line carriers with or without a written request to monitor non encrypted voice and Facsimile transmissions. It has been this way since the 1960's. These intercept locations include many possibilities including direct monitoring that is Not directly or explicitly identified by the carrier. In the past, telcos could know about a particular government ( usually) and as a result they required the intercepting organization to sign a broad NDA that would never reveal cooperation and extent of the monitoring by the Telco. Today, it is not absolutely required by the telcos to know these interceptions are occurring and at what locations and for what reasons. They want Plausible Deniability especially when the request is not legal. Why should telco's spend so much investor money on illegal spying, even when directed by government requests?

  • @matai2437
    @matai2437 Před 2 měsíci

    Traffic offences 3rd party rules added to existing.laws that cant be explained what does the corperate health group have to do with two traffic offences over a 30 year period preventing me from being issued an Australian licence the last offence was 14 years ago ansd why is their no court diocuments no records of offences put in explaining why i need a phycological evaluation to drive a vehicle in Australia come to New Zealand see how good these shrinks are driving in snow covered mountians give me a break they already know i can drive but personal medical records and police records and emails of injuries after being hit by a truck on my bike im sure there has to be a digital footprint left in my sister's email inbox in New Zealand thats got to be the police ten years of time watching my back these fuckers know it law and order is no where to be found

  • @steffybael1245
    @steffybael1245 Před 2 měsíci

    TWO MEN CAN KEEP A SECRET IF ONE OF THEM IS A DEAD MAN!!
    I USE EMAIL AND CZcams MAINLY. I HAVE MY WIFE AND OUR CHILD AND JUST 1 FRIEND, A FORMER LIVE IN LOVER WHO BECAME JUST A FRIEND. NO NEED TO CALL ANYONE!!

  • @Aminbathat
    @Aminbathat Před 2 měsíci +2

    you are all my enemies now

    • @Randytherumbler
      @Randytherumbler Před 2 měsíci

      Go move to China. They'd ❤ you there.

    • @Aminbathat
      @Aminbathat Před 2 měsíci

      @@Randytherumbler i know they love me very much they can eat some shitcandy

    • @Aminbathat
      @Aminbathat Před 2 měsíci

      @@Randytherumbler the problem here is that china just is full of love towards people right they just love us all that is why they screw us all

    • @Aminbathat
      @Aminbathat Před 2 měsíci

      @@Randytherumbler why dont you just talk to me man i thought a 1000 things at once they messed so badly with my head and show you and show you and show you

    • @Aminbathat
      @Aminbathat Před 2 měsíci

      ​@@Randytherumbler really china is just they are just the worst so i dont give a s about them they are morally on the same level as usa but people we are and we can solve our issues with words or not if nobody was harmed by you

  • @robertbroek5004
    @robertbroek5004 Před 2 měsíci

    Hope so baybay water memory 😉and huuuu akasha records is watch taping themmmm to incl there nasi kids😉😇😅god is on side offff😇not slavery orrr😉😇rot away from inside out in time laps a plant grow up the rottttttt away😉😇

  • @user-ku8ef6qz7u
    @user-ku8ef6qz7u Před 2 měsíci +2

    Wow. Law enforcement is suss. My question is why would someone go through all that effort to target someone in that big sea of data? In your average city, they have hundreds of thousands of customers. Maybe they are targeting certain demographics? Maybe poor people? I wonder 🤔 Maybe it's corruption or maybe a false feeling of power. Mobile companies and app developers like to rip off artists and designers with AI. I just wish we had police that were on OUR side and not the mobile carriers when they do rip off designers. As I get older, I am less naive to corruption.

  • @jamesfox2857
    @jamesfox2857 Před 2 měsíci

    Thank You !

  • @richardb4787
    @richardb4787 Před 2 měsíci +1

    That little dot next to the camera, on my android phone, how do I turn it off? I heard it's spying on me. I went through the settings to turn off location, but there's still that dot.

  • @richardb4787
    @richardb4787 Před 2 měsíci

    That little dot next to the camera, on my android phone, how do I turn it off? I heard it's spying on me. I went through the settings to turn off location, but there's still that dot.