Why?
Because Coronavirus is already killing people. Why would people make vaccines and put extremely expensive Bio-technology or nanabots or both in vaccines?
If you know anything about nanotechnology or Bio-Technology it just wouldn't make any sense because let's say you wanted to kill everyone, coronavirus is already doing that and putting most restaurants and people in the travel business out of business worldwide.
So, coronavirus has already created something much worse than the Great Depression ever was already here on earth and not just in one country but pretty much in all countries, especially democracies worldwide.
So, if someone wanted to put bio-technology or nanabots into vaccines what would they be trying to accomplish because coronavirus is already wiping out millions of people worldwide already if you have actually studied coronavirus worldwide.
Just because countries like Russia, China and Brazil have weaponized it to kill their people and Trump has also weaponized it to kill so far 270,000 plus Americans doesn't mean that people making vaccines are adding stuff too unless you think Trump is trying to do something to people in the U.S. or Europe.
Besides, What would you have vaccines do? Coronavirus is already killing a lot of people and unless you are wanting to extinct most people who get the vaccine what are you trying to do.
Bio-Technology and nanobots could be used to kill people but they could also be used to make lifespans 100 to 500 to 1000 years too.
So, what do you think people are trying to accomplish here anyway?
Usually there is some logic to what people are trying to do and I don't see any logic to kill even more people than coronavirus actually has or will kill on into the future, especially people who choose not to get the vaccine because they are paranoid.
I heard about an older lady saying to her doctor today that: "Aren't you worried about nanobots in your vaccine tracking you?"
This is really stupid because all governments already track everyone on earth through their cell phones and sometimes even target the hellfire missiles in the middle East directly towards people's cell phones to kill them, especially if they are terrorists or drug dealers or something like that.
So, EVERYONE with a cell phone is already being tracked by ALL governments and many criminal enterprises and Corporations too. So, why would they need a vaccine's nanobots or Bio-technology to do that when it has already been done for over 20 years now all over the earth with cell phones.
IF you understand ANYTHING at all about Cell phone technology one of the first things a cell service has to do is to locate your phone so you can receive a call and find a phone's location on the earth when you make a call anywhere. So, whenever you have your cell phone on anywhere on earth anyone can track you that wants to that understands this technology from anywhere on earth.
Here is an article on Cell phone Surveillance from Wikipedia to help you understand how all this works worldwide:
begin quote from:
Cellphone surveillance
Cellphone surveillance (also known as cellphone spying) may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones.[1] It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.[2]
Mass cellphone surveillance[edit]
Stingray devices[edit]
StingRay devices are a technology that mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers.[3] This process is invisible to the end-user and allows the device operator's full access to any communicated data.[3] This technology is a form of Man-in-the-middle attack.[4]
StingRays are used by law enforcement agencies to track people's movements, and intercept and record conversations, names, phone numbers and text messages from mobile phones.[1] Their use entails the monitoring and collection of data from all mobile phones within a target area.[1] Law enforcement agencies in Northern California that have purchased StingRay devices include the Oakland Police Department, San Francisco Police Department, Sacramento County Sheriff's Department, San Jose Police Department and the Fremont Police Department.[1] The Fremont Police Department's use of a StingRay device is in a partnership with the Oakland Police Department and the Alameda County District Attorney's Office.[1]
End-to-end encryption such as Signal Messenger protects traffic against stingray devices via cryptographic strategies.[5]
Tower dumps[edit]
A tower dump is the sharing of identifying information by a cell tower operator, which can be used to identify where a given individual was at a certain time.[6][7] As mobile phone users move, their devices will connect to nearby cell towers in order to maintain a strong signal even while the phone is not actively in use.[8][7] These towers record identifying information about cellphones connected to them which then can be used to track individuals.[6][7]
In most of the United States, police can get many kinds of cellphone data without obtaining a warrant. Law-enforcement records show, police can use initial data from a tower dump to ask for another court order for more information, including addresses, billing records and logs of calls, texts and locations.[7]
Targeted surveillance[edit]
Software vulnerabilities[edit]
Cellphone bugs can be created by disabling the ringing feature on a mobile phone, allowing a caller to call a phone to access its microphone and listening. One example of this was the group FaceTime bug.
In the United States, the FBI has used "roving bugs", which entails the activation of microphones on mobile phones to the monitoring of conversations.[9]
Cellphone spying software[edit]
Cellphone spying software[10] is a type of cellphone bugging, tracking, and monitoring software that is surreptitiously installed on mobile phones. This software can enable conversations to be heard and recorded from phones upon which it is installed.[11] Cellphone spying software can be downloaded onto cellphones.[12] Cellphone spying software enables the monitoring or stalking of a target cellphone from a remote location with some of the following techniques:[13]
- Allowing remote observation of the target cellphone position in real-time on a map
- Remotely enabling microphones to capture and forward conversations. Microphones can be activated during a call or when the phone is on standby for capturing conversations near the cellphone.
- Receiving remote alerts and/or text messages each time somebody dials a number on the cellphone
- Remotely reading text messages and call logs
Cellphone spying software can enable microphones on mobile phones when phones are not being used, and can be installed by mobile providers.[9]
Bugging[edit]
Intentionally hiding a cell phone in a location is a bugging technique. Some hidden cellphone bugs rely on Wi-Fi hotspots, rather than cellular data, where the tracker rootkit software periodically "wakes up" and signs into a public Wi-Fi hotspot to upload tracker data onto a public internet server.
Lawful interception[edit]
Governments may sometimes legally monitor mobile phone communications - a procedure known as lawful interception.[14]
In the United States the government pays phone companies directly to record and collect cellular communications from specified individuals.[14] U.S. law enforcement agencies can also legally track the movements of people from their mobile phone signals upon obtaining a court order to do so.[2]
Real-time location data[edit]
In 2018, United States cellphone carriers, AT&T, Verizon, T-Mobile, and Sprint, that sell customers' real-time location data publicly stated that they would cease those data sales because the FCC found that the companies had been negligent in protecting the personal privacy of its customers' data. Location aggregators, bounty hunters, and others including law enforcement agencies that did not obtain search warrants, use that information. FCC Chairman Ajit Pai concluded that carriers had apparently violated federal law. However, during 2019, the carriers were continuing to sell real-time location data. During late February 2020, the FCC was seeking fines on the carriers in the case.[15]
Occurrences[edit]
In 2005, the prime minister of Greece was advised that his, over 100 dignitaries', and the mayor of Athens' mobile phones were bugged.[11] Kostas Tsalikidis, a Vodafone-Panafon employee, was implicated in the matter as using his position as head of the company's network planning to assist in the bugging.[11] Tsalikidis was found hanged in his apartment the day before the leaders were notified about the bugging, which was reported as "an apparent suicide."[16][17][18][19]
Security holes within Signalling System No. 7 (SS7), called Common Channel Signalling System 7 (CCSS7) in the US and Common Channel Interoffice Signaling 7 (CCIS7) in the UK, were demonstrated at Chaos Communication Congress, Hamburg in 2014.[20][21]
Detection[edit]
Some indications of possible cellphone surveillance occurring may include a mobile phone waking up unexpectedly, using a lot of the CPU when on idle or when not in use, hearing clicking or beeping sounds when conversations are occurring and the circuit board of the phone being warm despite the phone not being used.[27][35][44] However, sophisticated surveillance methods can be completely invisible to the user and may be able to evade detection techniques currently employed by security researchers and ecosystem providers.[45]
Prevention[edit]
Preventive measures against cellphone surveillance include not losing or allowing strangers to use a mobile phone and the utilization of an access password.[12][13] Turning off and then also removing the battery from a phone when not in use is another technique.[12][13] Jamming or a Faraday cage may also work, the latter obviating removal of the battery. Another solution is a cellphone with a physical (electric) switch or isolated electronic switch that disconnects microphone, a camera without bypass, meaning switch can be operated by the user only - no software can connect it back.
See also[edit]
No comments:
Post a Comment