Think It Can’t Happen Here? Austin Bomber’s Capture Exposes Depth Of US Surveillance State

Authored by Jeremiah Johnson via SHTFplan.com,

Many have argued that there is neither a surveillance state, nor a concerted effort to disarm the public door-to-door, house by house, etc. Some of these are far-leftists, masquerading as conservatives….. trying to appear “skeptically cynical.”

https://www.zerohedge.com/sites/default/files/inline-images/mass-survey-e1505413842127.jpg?itok=wsLg9Y4D

We’ll “game” the thought, to bring everyone back from opacity to transparency.

-----------------------------------------------------
It is my sincere desire to provide readers of this site with the best unbiased information available, and a forum where it can be discussed openly, as our Founders intended. But it is not easy nor inexpensive to do so, especially when those who wish to prevent us from making the truth known, attack us without mercy on all fronts on a daily basis. So each time you visit the site, I would ask that you consider the value that you receive and have received from The Burning Platform and the community of which you are a vital part. I can't do it all alone, and I need your help and support to keep it alive. Please consider contributing an amount commensurate to the value that you receive from this site and community, or even by becoming a sustaining supporter through periodic contributions. [Burning Platform LLC - PO Box 1520 Kulpsville, PA 19443] or Paypal

-----------------------------------------------------
To donate via Stripe, click here.
-----------------------------------------------------
Use promo code ILMF2, and save up to 66% on all MyPillow purchases. (The Burning Platform benefits when you use this promo code.)
  1. The Communists, Marxists, Leftists, Progressives, Liberals, Democrats, and their ilk deliberately try to disguise the true objectives as outlined in the Planks of the Communist Party…passing themselves off as “middle-ground” in their stances.
  2. By denigrating the concept of an imminent surveillance state and ridiculing it, they draw conservatives who are still undecided (“fringe elements”) out of being proponents of the idea…further weakening and obfuscating people’s awareness.
  3. The movement of the groups mentioned never ceases: It hasn’t ceased with the fall of the Berlin Wall and subsequent reunification of Germany in 1990, nor the fall of the Soviet Union…more a “restructuring” than a fall…in 1992. The Communists are alive and well, operating within the United States at the lowest levels of society, and at the highest levels of government. We’ll stay with “Communists” as the label, as they are the end-state and will purge all the others who aren’t in complete lock step with them. They are Communists.

That being mentioned, as they craft their narratives and lie openly upon the television, radio, and within the newspapers, there is a subtle, devious operation going on right before your eyes:

The emplacement of a complete surveillance state of cameras and listening devices, all a part of the “wondrous internet of things.”

For that last paraphrase, thank David Petraeus… former head of the CIA (in name only) yet without the technical alacrity to avoid the very thing he lauded… and hence, his downfall via Paula Bridewell. Thanks, Dave, for your erstwhile contribution to crafting the surveillance state. Dave serves as the prime example: no matter how much of a “big hitter” toward the NWO (New World Order) a globalist or establishmentarian one is, they are always expendable.

The surveillance state has just been proven with the recent string of bombings in Austin, Texas where the protagonist blew himself up when he was tailed and cornered. This article was released by AP, written by Paul J. Weber on 3/22/18, and it seems to have escaped much notice. I am providing an excerpt that is almost the full article. When you read it, you will see why it is so important. Here it is:

How Police Finally Found the Austin Bomber

AUSTIN, Texas (AP) — The suspected Austin bomber is dead after terrorizing Texas’ capital city for three weeks. And in the end the manhunt wasn’t cracked by hundreds of phoned-in tips, the big pot of reward money or police pleading to the bomber through TV.

One of the largest bombing investigations in the U.S. since the Boston Marathon attacks in 2013 came to an intense close early Wednesday when authorities say they moved in on Mark Anthony Conditt at an interstate hotel. Austin Police Chief Brian Manley said Conditt blew himself up after running his sport utility vehicle into a ditch.

Here is what’s known about how authorities finally zeroed in on the suspected bomber after 19 days, two dead victims and more than 1,000 calls of suspicious packages around the city:

___

GETTING THE BOMBER ON CAMERA

Conditt had been careful to avoid cameras before entering a FedEx store in southwest Austin this week disguised in a blond wig and gloves, said U.S. House Homeland Security chairman Michael McCaul. The Austin congressman had been briefed by police, the FBI and the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives.

McCaul said going into the store was Conditt’s “fatal mistake.” He said authorities previously had leads on a red truck and that the surveillance video from the FedEx store — where Conditt is believed to have dropped off an explosive package destined for an Austin address — allowed investigators to identify him and the truck.

Said Texas Gov. Greg Abbott, “I’m not sure how much they narrowed him down to an exact person of who he was before he went into that FedEx store.”

___

TRACKING THE CELLPHONE

At the FedEx store, McCaul said investigators got from surveillance the truck license plate that linked the vehicle to Conditt, which in turn gave authorities a cellphone number they could track. McCaul said Conditt had powered down his phone for “quite some time” but that police closed in when he switched it back on.

“He turned it on, it pinged, and then the chased ensued,” McCaul said.

Abbott said police were able to closely monitor Conditt and his movements for about 24 hours before his death. The governor said the phone number was used to tie Conditt to bombing sites around Austin.

“The suspect’s cellphone number showed up at each of the bombing sites as well as some key locations that helped them connect him to the crime,” Abbott said.

___

BUYING BOMB-MAKING MATERIALS

Authorities say they also tracked down Conditt, a 23-year-old unemployed college dropout, through witness accounts and other purchases, including at a Home Depot where McCaul said the suspect bought nails and other bomb-making materials.

Abbott said Conditt’s purchases at the Home Depot also included five “CHILDREN AT PLAY” signs, one of which was used to rig a tripwire that was set off by two men Sunday in a southwest Austin neighborhood. One of them was walking and the other was riding a bike.

William Grote told The Associated Press that his grandson was one of the victims and had nails embedded in his legs from Sunday’s explosion.

The batteries to power the bomb were purchased through the internet, McCaul said.

___

STILL PUTTING TOGETHER A PROFILE

The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male, McCaul said. And while that part was right, the congressman said, a full psychological profile won’t come together until investigators have time to comb through Conditt’s writings and social media posts.

Conditt’s motive is not clear. But on Wednesday, police discovered a 25-minute video recording on a cellphone found with Conditt, which Manley said he considers a “confession” to the bombings. Manley said it described the differences among the bombs in great detail.”

Obviously, someone made a big mistake in revealing this information to the stultified, oblivious public… that self-same public of “We the People” that has the right to know, and yet doesn’t understand what is happening.

Worse: The public doesn’t care what’s happening.

Let’s summarize what these main points mean, for those of you who docare:

  1. The cellular telephone is nothing more than a tracking device…as mentioned, it “pings” its position and gives away the location of the owner…along with all of his vital information in the file… every four seconds.
  2. The cell phone’s location is tied into the location of every camera, public and private that has a tie-in to the CCTV system monitored by law enforcement in the fusion centers…from the Happy Burger parking lot cameras to the cameras mounted at the intersections in cities, towns, and suburbs. As the happy cell phone passes these locations, the movement is tracked in real time, and recorded.
  3. Granted, they had a suspect, but they can review all of the cameras at any business at any given time…to show what Joe the Plumber-turned-bomber may be purchasing at the friendly store…and they can tie that film in with real-time with the cell phone.
  4. The vehicle is also the “buddy” of the police and the surveillance establishment. They take pictures and film of the license plate, the car, and glimpses of Joe the Plumber driving it…corroborated by the happy, ever-pinging cellular telephone (the tracking device).
  5. All this data for everyone’s movements is recorded, catalogued, and stored…stored away for an indefinite period of time (forever) until the information is needed as evidence or in an investigation. Investigation!  Doesn’t that sound exciting?  Guess what?  Everyone is being investigated, and all of the data on everyone is kept.
  6. Purchases! Everybody has to buy things, stuff, etc.  Every time you pull up to the gas pump, the car is photographed.  The POS (point of sale) at the register tabulates and inventories everything, tying it in to the gas pump, with a picture of Joe and whatever form of fiat he used to pay for the gas and bag of chips.  Purchases track in real time, access whatever form of payment you use, tying you in with others…if you use your spouse’s credit card, for example.
  7. Cops have license plate/tag readers that can read hundreds of different plates, categorizing all of them in accordance with sensitive data that may have nothing to do with driving upon the roads or their record with the vehicle.
  8. Every Internet search, every purchase, every query, every e-mail is saved and read/tabulated into the overall matrix that assesses the potential for an individual to be “harmful” and stored…to be matched against the subject’s behavior and movements at a later date. Systems are already in place that analyze keystrokes for the comparison and narrowing down of who the typist is.
  9. Every library sign-out…film, music, or book…is saved and kept for future reference.
  10. Biometrics are making the “fingerprint” even more specific…with eye to eye distances, ear shapes, and gaits measured.  Any exposed portion of the skin, and the movement and function of the limbs is analyzed and recorded.
  11. Every piece of mail is scanned to save sender and recipient’s addresses and (of course) purchases are recorded within the company and matched against what is sent out and to whom.
  12. Satellites can target and surveil in real time and tie in to all of the little devices just mentioned.
  13. Laptop computers can be traced in accordance with the purchaser’s information from the POS and onward…and the laptops record, photograph, and film as well as putting forth a “ping” of their own…especially when connected to the Internet. All laptop use is matched and corresponded to other places of business (their cameras, etc.)
  14. Association: when you’re on your laptop, and here come Smiling Sam and Brother Bob, each with pinging cell phones…letting the authorities know that in that moment of time (Whitney Houston’s “One Moment in Time”) Sam and Bob were right in front of you. Later they can haul both of them in to corroborate that you were on your laptop in front of HappyBurger at whatever date or time they have on record.

This excerpt shows that all of these items are in place. Yes, they are surveilling you…are watching all of us. The surveillance is not ubiquitous yet. Not yet. It will be, and soon. They utilized every feature mentioned above to find the bomber. Great. Society has triumphed, and the mad bomber has met his end.

But has society really triumphed? That article gives you insight into how the cage is almost completed…the construction is just about finished. What requires further thought is what they will do with this surveillance once it is in place and ubiquitous. Just a few further thoughts for your consideration. You may want to watch what you place into your e-mails and comments. There are techies in the Puzzle Palace and at Ft. Meade whose function is identifying the commenters.

Don’t place anything on the Internet that can come back and bite you later. The most effective means of exchange are not on the Internet when it comes to information. Blogs, writers, and commenters have already been “marginalized” and their effectiveness diminished because it is an open source. Your true effectiveness in getting things done is at the “grass roots” level…locally, in small groups for discussion. Your “tool of transmission” is a manual typewriter.  Need copies?  Get back to Carbon paper. There won’t be a recording of what you copied at your FriendlyCopy center…the one with your information in real-time, right under the eye of the happy surveillance camera in the corner.

The one that superficially is to make sure you don’t take more than 1 or 2 paper clips…but manages to send the fusion centers every bit of data they need to match up their culprit (the copier) to the scene of the crime. They’ll also match up his credit card at the register, tally up his total purchases and copies over a period of time, and get plenty of information as it films him walking through the store and out the door.

Bottom line: we’re all “guilty” according to laws they haven’t even written yet. It is all about building a case against the average citizen. If you’re not the wolves, then you’re one of the cattle, in their eyes.

It will become worse. Much, much worse. If you doubt it and do not take necessary precautions, you may find out it exists when they come knocking on the door. It may already be too late, and their song is “We’ve Only Just Begun,” by Karen Carpenter…. but not to smile. They’ve been doing that for years, as they have taken our taxes to craft the very cages that are almost completed. The next step? Not hard to figure out, and it has happened before…as history repeats itself. Think “Solzhenitsyn,” and think of tomorrow.

 

Subscribe
Notify of
guest
31 Comments
Card802
Card802
March 28, 2018 7:11 am

Another thing I’d like to know is, the rumor about your cell phone listening to you, is that true or just a rumor?

Anonymous
Anonymous
  Card802
March 28, 2018 7:47 am

Your cell phone doesn’t listen to you, someone using it as a remote microphone does and they can, if they know what they are doing, turn it on remotely without you knowing it (your computer too, for that matter, if you leave it turned on and connected to the internet).

FWIW. That “someone” can be a remote computer assigned to spy on you or just scan the general cell population for key language being used. This isn’t new idea, it was in use during the Clinton administration monitoring telephone systems for key words, remember Echelon? Just an advanced Echelon system.

Also FWIW, all cell phones in the US have a GPS system that won’t stop when you turn it off unless you remove the battery (a no can do thing for some phones that have them built in and not easily removable), but you can still find sanitary burners from a few overseas sources if you have enough savvy in making clandestine type purchases.

Wip
Wip
  Anonymous
March 28, 2018 8:22 am

Does anyone make a case you can put your phone in that blocks signals?

Anonymous
Anonymous
  Wip
March 28, 2018 8:29 am

I’ve heard claims of them, but have never tested one to see if it actually works or not. It would probably easy enough to test, just put one in one -or anything else you are testing- and try to call it to see if the call goes through.

My thinking is why not just leave it somewhere when you don’t want to be spied on since if you take it out of the case or turn it on to use it they immediately know where you are, sort of defeating the purpose of the signal blocking in the first place and there is no reason to have it with you if you aren’t going to be using it.

unit472/
unit472/
  Wip
March 28, 2018 12:19 pm

Yes, you can buy GPS jammers that block GPS, cell, radio and mobile computer signals. They are illegal but not hard to order from China.

I used them at work when, after being told GPS was only for our safety, I found the general manager doing nothing but peering at the company vehicles stated status and its physical location. If they didn’t match people were reprimanded. I pointed out an employee could be sitting in his vehicle marked ‘at job’ and be doing nothing more than chatting on the phone or watch porno so GPS didn’t really tell you much but the GM was a negro so such thoughts went over the top of his burr head.

Anyway to render myself ‘invisible’ I bought several GPS jammers. What happens is they continue to show you at the last location you were at before the jamming began. The problem is the basic device will also shut down your cellphone, stepped frequency radio and mobile computer too. You can remove the antennas for the other applications to avoid this or if you are an SOB like me, you can buy a big one that has a range of 100 yards or more and shut down all cell phone communications at stop lights so people pay attention to their driving or in an emergency involving the police, shut down his ability to run your license or even make or receive radio transmissions. Just don’t get caught because that is a felony.

Iconoclast421
Iconoclast421
  Wip
March 28, 2018 2:21 pm

Just wrap it in aluminum foil. Try sending a text to a phone that is wrapped in foil. It wont receive it! Not until you remove the foil.

c1ue
c1ue
  Iconoclast421
March 29, 2018 1:20 pm

Aluminum foil will not necessarily work.
Fail.

c1ue
c1ue
  Wip
March 29, 2018 1:19 pm

Buy a credible Faraday bag.
Test by putting your phone in it, then calling the phone from another number. If the phone rings, that bag is a fake.
Of course, if you do that, you’ll also not be able to use the phone. And if you don’t turn the phone off, you’ll also drain the battery really fast as the phone goes into max signal acquisition mode.

Ottomatik
Ottomatik
  Anonymous
March 28, 2018 10:29 am

You can never “turn off” gps with any phone that is on, triangulation is required for service.

garyb
garyb
  Anonymous
March 28, 2018 3:33 pm

assume after all this time (20+)years that every phone call has been
voice-printed in a computer some where and you’re id’d in real time.

Westcoastdeplorable
Westcoastdeplorable
  Anonymous
March 28, 2018 10:00 pm

Echelon and the biggie.. Promis software
And the story on Able Danger sorta faded away….

c1ue
c1ue
  Anonymous
March 29, 2018 1:18 pm

Not quite correct.
If you use a voice activated assistant or voice activated speed dialing, then the phone is 100% listening to you. The only question at that point is if the audio feed is being recorded and sent somewhere else.
As for GPS – also wrong. GPS is turned off all the time because it sucks battery like nobody’s business.
However, there are lots of way to turn GPS on, but more importantly there are alternate ways to get your location without GPS.
These include:
1) cell tower triangulation. Your cell phone, if it is any signal, is connecting to a cell tower. Often it can “see” more than one. The strength of signal and direction is used to derive a rough location. This is truly never off.
2) Wifi triangulation. If you use WiFi and leave your wifi connection capability on, your phone will ping every wifi in its vicinity. Many companies have mapped these wifi locations, and so this is another way to track you, but it can be disabled by just not using wifi (which you really shouldn’t anyway unless absolutely necessary. Look up wifiphishing).

Iska Waran
Iska Waran
  Card802
March 28, 2018 9:54 am

Your smart phone can listen to you. If you use “Siri” it does. A coworker started getting pop-up ads for geothermal heating systems after only talking about it once (and never having done any searches). You can turn it off. That is distinct, of course, from the ability of the intelligence community to remotely turn on your phone’s camera and microphone.

Boat Guy
Boat Guy
March 28, 2018 8:03 am

Refuse and resist where ever you can by answering all their questions with questions . Never answer any questions authorities ask especially badge wearing minions , they are not your friend and have zero responsibility to protect and defend you .
The census is a good example of governments encrochment into your private affairs by allegedly asking far to many questions regarding your home income and daily habits . That info is creating a profile and it can and will be used against you . Just like my response !
“FORGET ME NOT”

Anonymous
Anonymous
  Boat Guy
March 28, 2018 8:35 am

Just refuse to talk to them, other than identifying yourself, without an attorney. You have that right, if you don’t use it you lose it.

Of course, there are some times when it should obviously be OK to talk to them, just never when they appear and ask questions unexpectedly with no apparent reason for questioning you. Never offer information you are not being asked about or unrelated to the question (that sounds like trying to justify something and opens new avenues of questioning).

Wip
Wip
March 28, 2018 8:18 am

Necessary steps to protect yourself? Seems like a stupid comment. Especially since the author lists zero.

Maybe the mark of the beast is a combination of technologies not just your celly.

Llpoh
Llpoh
  Wip
March 28, 2018 9:02 am

Mark of the beast will be when cash is eliminated. You will need that mark to buy or sell.

Anonymous
Anonymous
  Llpoh
March 28, 2018 9:09 am

I’m thinking the elimination of cash will just be one way to get people to accept the mark, the mark itself will be some kind of universal identification that registers each person as a unique individual for virtually every action they engage in (monetary transactions just being one of them, things like legal residence status, voting, residence, etc. also a part of it).

Wip
Wip
  Llpoh
March 28, 2018 9:39 am

Hey, where have you been?

Smoke Jensen
Smoke Jensen
  Wip
March 28, 2018 9:04 am

@Wip
“Maybe the mark of the beast is a combination of technologies not just your celly”.
No maybe about it Wip. Satan is not omnipresent nor omniscient like the creator. In order to control every living being he will need a system that can do it for him. Enter the surveillance state. Once complete, those who do not bow to or take his mark can be cut off from the system with a keystroke or a algorithm for that matter. The final piece of the puzzle will be an electronic currency. As long as we can work for and use cash for purchases we will be able to operate more or less out of the System.
I believe the crypto currencies are the final nail in the coffin. Eventually the Fed will settle on the most successful of the crypto currencies and make that one legal tender and accepted for payment of taxes. Then cash will be phased out as old timers like us die off. The next generation has already been primed to go cashless. PayPal, Apple Pay, Online banking , etc. are too convenient .
The cage is nearly complete.

Llpoh
Llpoh
  Smoke Jensen
March 28, 2018 9:07 am

Smoke – ha! Beat you to it. It pays to be succinct.

Smoke Jensen
Smoke Jensen
  Llpoh
March 28, 2018 9:34 am

Llpoh,
It took me 15 minutes to pound that out.

Llpoh
Llpoh
March 28, 2018 9:04 am

Freedom. Security. Pick one.

A couple we thought were friends dropped us when we told them we support the Second. No great loss, but disappointing how closed minded folks are. “It can never happen here!” Uh-huh. Sure. History is littered with the bodies of the dead that believed that.

KeyserSusie
KeyserSusie
March 28, 2018 9:43 am

Siri (or your phone) listens and is programmed to ‘hear’ content and emotional intonation, as I understand it. And it certainly can send reports.
My Florida Turnpike toll gizmo pings back anywhere there is a pinger. XM/Sirius car radio most likely could be used on you. Onstar certainly. The next conflict will use codes sent to your modern vehicle to shut it down, no need for an emp. I am guessing there are signal codes to shut down your computers and cell phones.

5G anyone? The military is all over these issues in combat situations and in hostile environments. They have a history of being ahead of the curve but technical/electronic superiority is not a given any more.

Several times a week I receive spam wireless calls. I have taken to not answering any call I do not know. I wonder if “they” just want me to look at my phone (so they can do a visual or confirm my location.) AND several times a month I get call-back calls from strangers who say my number called them.

Iska Waran
Iska Waran
March 28, 2018 10:00 am

I get calls from The Rewards Center promising me a vacation in Del Boca Vista. Fucking CIA.

October Sky
October Sky
March 28, 2018 1:20 pm

“Emerging ‘hyperwar’ signals ‘AI-fueled, machine-waged’ future of conflict”

“An FDA for Algorithms”

The above Fifth Domain article and Andrew Tutt’s paper show how the surveillance state may advance.

rhs jr
rhs jr
March 28, 2018 2:06 pm

Sorry, some new Copy Center copy machines (and ones at work) can electronically record whatever you copy; no privacy there. There are many ways to eves-drop on conversations in rooms from 100s of feet away so any anti-ZOG conversations would have to be very far from any possible spies, like maybe way in a great swamp or under a waterfall but you’d still be observed by their drones.

Westcoastdeplorable
Westcoastdeplorable
  rhs jr
March 28, 2018 10:06 pm

Copiers since the late 80’s had hard drives on some models, and 1,000’s were sold at auction w/o wiping them (not with a cloth, Hilliary). I heard some criminal activity was involved in harvesting documents.

NtroP
NtroP
March 28, 2018 4:49 pm

I wonder if we’re all on the Red List in alphabetical order, by geographical location, or all just lumped together as a sub-category under Jim Quinn?

c1ue
c1ue
March 29, 2018 1:22 pm

The article talks about a bit, but doesn’t go deep enough into the main source of privacy invasion: the internet.
More specifically, the Googles and Facebooks of the world.
By reading TBP, everyone here has already been surveyed and labeled as a specific type.
This profile is then correlated with all of the other sites visited by each TBP reader to form their online profile.

Sam Fox
Sam Fox
March 30, 2018 2:50 am

Am I missing something? I left some comments that disappeared. One was to Anon, another to Smoke. Plus one or two more. Hmmm…I think my thumbs up are still there though. ?????

SamFox

Edit to add that I went my inbox to confirm that I was following & still the replies I left are gone.