Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

Featured Post

Restored Republic via a GCR as of June 20, 2018

Restored Republic via a GCR as of June 20 2018 Compiled 20 June 12:01 am EST by Judy Byington, MSW, LCSW, ret. CEO, Child Abuse Recovery, ...

Tuesday, December 13, 2016

A.I. Explained -- RFID Chips, Cellphone Tower Connections

Submitted to Operation Disclosure,

RFID chips and cellphone towers connection, AI

I will play with possibility that what if alternative media programming about RFID chips injecting under skin is false way.Lets explore other hiden possibility.!

First thing wasn’t clear to me,because I work with RFID chips at work for choosing programs,and I know that the capacity and programming,reading and durability is pretty s..t. How people will be ”pleased”if they will be exchanging their RFID chips under their skin often under surgery?RFID have lots of errors,bad reading,everything what could be wrong with this electronic part is wrong.

Second thing which is not clear to me is the rapid rise of cell phone towers here is what I found they are for :

The Google Maps product for cell phones is now using cell tower ID information to tell users where they are.

So we got here tracking positioning system

Rather than offering you cellphone service, the towers appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts.

Collecting and analyzing information from simple cell phones can provide surprising insights into how people move about and behave

The world’s six billion mobile phones generate huge amounts of data—including location tracking and information on commercial activity, search history, and links in social networks. Innumerable efforts to mine the data in different ways are under way in research and business organizations around the world. And of those six billion phones, five billion are in developing countries. Many of them are cheap phones that can do little besides make calls and send text messages. But all such activity can be tracked back to cell-phone towers, providing a rough way to trace a person’s movements. Throw in the spread of mobile payment technology for simple commerce and you have the raw material for insights not only into epidemiology but into employment trends, social tensions, poverty, transportation, and economic activity.

The course covers the use of information stored on the handset, SIM cards, expansion cards, prepaid phones, live and historical tracking, cell-based financial crimes, payments and money laundering, cyber stalking and cloud storage.

An incredible amount of evidence is just sitting on smartphones waiting for you to access it. You would never overlook a drop of blood at a crime scene. A cell phone may even be more helpful, and that includes info “deleted” from the phone.

Electronic Evidence Found on Cell Phones
(Including Deleted Information)

Text messages (SMS, Short Message Service)
Photo / Multimedia Messages (Multimedia Message Service)
Pictures and Images
Video and Audio Recordings
Call History Logs (calls received, calls made, missed calls)
Phonebook and Contact Lists
Calendar and Task List Entries
E-mails Stored on Handset
Internet Browsing History
Social Networking Artifacts (Twitter, Facebook)
Application Artifacts (data from apps installed on smartphones)
Evidence Found on SIM Cards:

Subscriber phone number
Service provider name
Phone book
Last dialed numbers
SMS text messages
Deleted text messages
Forbidden networks FPLMN
Location area identifier

The standards for obtaining tower data and the limits on its use by a plethora of agencies are inconsistent and unclear.

tracking of cellphone location through the cell service provider

Historical is when police go to cellphone companies and ask for a record of all of the cell towers and sectors that the suspect’s phone was located in every time that person made or received a phone call or text message. The cellphone company is logging not only the cell tower the phone is connected to — at the start and end of each call or connection — but also the sector within that cellphone tower. The cell towers have multiple antennas facing different directions, and so the cellphone company actually knows which direction you are making the call from.

How long do they maintain those records?

It differs between cell service providers; some keep it from one year to 18 months. Since 2008, AT&T has said it keeps the records indefinitely.

“The cellphone company is logging … the start and end of each call or connection.”

real-time information about somebody’s cellphone location and that will often involve the cellphone company pinging the phone — every few seconds, or every minute or every couple minutes — so that the phone is actually reporting back its location much more frequently than whenever you happened to have made a call.

Actually have the ability to activate the GPS chip in the phone to get exact coordinates.

So that’s a tool they can use when law enforcement agents know the phone number of a suspect. What do they use if they don’t?

NF: This is when the police will go to a cell service provider and ask for a list of every cellphone that connected to a tower, or a particular set of towers, during some time period in the past. That results in a download of a whole bunch of people’s location information and identifying information about their phones, which will invariably include hundreds or thousands — or in one case we’ve seen, hundreds of thousands — of completely innocent people’s information.

Harris Corporation– whole line of these devices-different models with different trade names. The most common one is called the Stingray-then moved on to ominous weather systems

cover a high-traffic area where they are triggering many phones — it could be hundreds or easily thousands

they are sending out invasive electronic signals that are traveling through the walls of private homes and offices and other private spaces and then revealing information about who is inside and where inside the phone is.

Seems to be a clear violation of privacy.

Those are places where the Supreme Court has repeatedly said have special protection under the Fourth Amendment of the Constitution. The home is our castle.

I actually think historical tracking is worse. These records give police information that they’ve never in the history of our country had access to before. It’s essentially a time machine into our past locations and associations. There was never at time in history when the police decided today that I was a suspect and then were able to track my information over a past time period.

Third thing which is not clear to me if they hold so much data how they evaluate them quickly from so many devices they need some software and would not they need supercomputers?

All data collection recognition SW may look like below



A three-story computer in Brussels, Belgium called “The Beast,” is described as being the brain-child of the European Common Market. It is said to be “self programming” and is intended to track the buying and selling activities of every person on earth.

Artificial intelligence is a fascinating subject, and computers are getting smarter every day, but no computer expert that I know of is worried about whether a database program could become the Antichrist.

Additionally, even if a decision were made to track all humans, it is not clear that the European Common Market would be the entity to initiate or control it.

Supercomputers are usually owned and maintained by government organizations or companies.

Cloud computing has also grown to encompass High Performance Computing or HPC in the cloud, and the providers of those products, services, and solutions are targeting research and scientific communities that have traditionally used supercomputers.

developing the future of artificial intelligence-web searching and speech recognition technology, while some of the collaborating researchers will be hoping to learn how similar tricks can be used to MODEL DISEASE AND CLIMATE It’s obviously unclear what will come of the project

machine-learning software that set a new record for recognizing images, beating a previous mark set by Google
dedicated to deep learning-

image-recognition software

The South Korean government will spend KRW 100 billion (US$86.7 million) on supercomputers for artificial intelligence

The first phase of the project will build a supercomputer in five years, which could predict marine disasters, landslides and wildfires.

include computer vision, machine-learning and multimedia content analysis, says the question now is how much we should control AI’s ability to self-learn.

A human can be affected by emotions, such as pressure or happiness, but a computer will not.

And a supercomputer can always improve — if it loses one game, then it would analyze it and do better next time.

If a supercomputer could totally imitate the human brain, and have human emotions, such as being angry or sad, it will be even more dangerous.

The technology has developed to a point that it can now outsmart a human in both simple and complex tasks. This is a concern, because artificial intelligence technology may reach a point in a few years where it is feasible that it could be adapted to areas of defense where a human may no longer be needed in the control loop: truly autonomous AI.”

You reader may noticed that I marked weather words,

And you see that they want to sell this AI and supercomputers that will predict weather,weather is so complex and they need supercomputers all over the world for that,do they think we are idiots?

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.