Exclusive documents obtained by Infowars from an insider government source have revealed the true origin and nature of the highly secretive ‘mesh network’ spy grid that has garnered massive media attention due to the fact that the network’s strange downtown Seattle spy boxes can track the last 1,000 GPS locations of cellphone users. But as new documents reveal, the grid is far deeper than the media is telling you. The Seattle DHS spy system ultimately ties in with an enormous stealth database that acts as an intelligence hub for all of your personal data.
On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project document that we have obtained, a diagram reveals the system’s basic communication abilities in regards to the Port of Seattle that the DHS has refused to comment on despite funding with millions in taxpayer dollars:
DHS spy system’s basic communication abilities in regards to the Port of Seattle ‘mesh network’ tracking system.
The Infowars team is closely reviewing the document and will publish it in whole soon. More images seen in the extensive documentation:
A documented image of the actual spy system put in place, highlighted in the original document itself.
A further breakdown of the spy operation.
The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions.
Labeled by their intersection location such as “1st&University” and “2nd& Seneca,” the multiple network devices are easily detected in Seattle’s downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return.
“How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?” asked Seattle newspaper The Stranger.
According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.
So far Seattle police have been tight-lipped about the network’s roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement.
According to The Stranger’s investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy.
Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagrams attached to a March 2012 proposal request (# DIT-2996), which have since been approved, updated and finalized, are publicly viewable at the Seattle.gov website.
Several connections can be made by studying the diagram, including its now apparent link to Seattle’s public waterfront. The recent instillation of 30 Department of Homeland Security-funded surveillance cameras on Seattle’s popular waterfront, complete with mesh network devices attached, were purported to increase the Port of Seattle’s protection against such acts as terrorism. Residents soon discovered multiple cameras facing inward toward Seattle homes, not towards the coast line as allegedly intended. The “accident” was later remedied by city officials.
While unknown members of multiple law enforcement agencies will have access to the mesh network, so will the Seattle Fusion Center, where FBI and Homeland Security gather data on Americans deemed “extremist” for such crimes as “loving liberty.” Incredibly, even the U.S. Senate called the Fusion Centers a “useless and costly effort that tramples on civil liberties” in a 2012 bi-partisan report.
Page 65 of the public document details the information-collecting capabilities of the Mesh Network Mesh System (NMS), revealing its ability to collect identifying data of anyone “accessing the network.” Although the document details an alert system for reporting unauthorized access, a public user guide from a similar Aruba software program lists the ability to collect “a wealth of information about unassociated devices,” validating fears of local residents who walk through the mesh network’s perimeter.
“The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
The bottom left of the diagram shows what may be the Seattle Department of Transportation Intelligent Transportation Systems Network, linked directly into the mesh network. According to the Department of Transportation website, the system controls several surveillance related items such as license plate readers and closed circuit TV (CCTV) systems.
An early draft of the diagram appears to show Seattle police vehicle’s ability to receive and “control” certain aspects of the mesh network. Whether police were originally intended to control surveillance cameras from their vehicles, including their panning, tilting and zooming abilities, remains unclear. According to statements made by Seattle’s Assistant Chief Paul McDonagh last February regarding the waterfront cameras specifically, “only a few people would have that capability, so the officer on the street would just have the ability to view it.”
In reality, Seattle is only one of countless cities across the country being flooded with a sea of surveillance equipment. While the public has focused mainly on surveillance issues relating to the NSA, the federal government has continued its 20-plus year dragnet surveillance grid roll out of covert conversation-recording microphones.
As recently reported by Storyleak, multiple cities including Las Vegas have begun using “Intellistreets” light fixtures capable of recording conversations. The device has received increased scrutiny since 2011 when their “Homeland Security” application, which shouts government messages from a loudspeaker system, was widely revealed to the public.
Other audio recording devices like the ShotSpotter microphones, allegedly used to analyze the location of gun shots, have been found to record conversations of unsuspecting city residents.
Despite the federal government’s constant justification of throwing away civil liberties in the name of fighting terrorism, which kills less Americans than bee stings, continued NSA revelations show that the federal government’s continued surveillance system build-up is aimed at everyday Americans, not foreign Al Qaeda admittedly supported by the U.S. government in Syria…
According to Assistant Police Chief Paul McDonagh, “on the homeland-security front, [the cameras will] monitor those people who are out for nefarious acts, monitor their behaviors,” but claims they will not look into residents’ houses.
However, as reported by the West Seattle Blog, some cameras were caught pointing inward, away from the coast line after first being put up. McDonagh insisted this was a mistake and that the cameras have been readjusted to face the waterfronts.
Little is known about the types of cameras being used and the software that goes along with them, and according to McDonagh, no public hearings are scheduled at this time.
A Freedom of Information Act request was made on Jan. 30 to find out details about the cameras, including purchase orders, maintenance contracts, owner’s manuals, data access procedures, data retention policies, etc.
However, the city’s proposal request and contract for the cameras and mesh wireless network were found available on the Seattle.gov website after a little digging.
What does this network really do?
Though the 30 waterway cameras drew the most attention, the program’s new wireless data “mesh network” is the more likely game-changer when it comes to the future of surveillance in Seattle. Contract documents and SPD statements differ somewhat on this issue. The contract calls for installing 180 Aruba Networks’ wireless transmitters and receivers (mWAPs) across the city. (The police department says 158 are being installed.) This so-called “mesh network” can send and receive large amounts of real-time data. For example, video and audio can move seamlessly from moving vehicles, such as police cars, to central points, such as police headquarters or the city’s Emergency Operations Center. From these central points, the data can be shared with any number of partners or agencies. Live video transmission is a core feature of the system; SPD has already field-tested it. The surveillance network is technically capable of sending video directly to police cruisers. For now, SPD vehicles can’t send live video back, but that could change with future upgrades to police equipment.
See this video of the mesh network in once city.
Alex Jones seems to be saying that this can see through walls, right into homes, in super high definition. Is it much more than a data transmission system for video cameras? Here’s some info on that, from over a year ago ( 8/05/12 ):
… Researchers in London have devised a stealthy system that gives off no radio waves so it can’t be detected, but by sniffing Wi-Fi signals, it can pinpoint a person’s movement inside a building. University College London scientists Karl Woodbridge and Kevin Chetty developed this suitcase-sized prototype that has successfully been tested through a one-foot-thick brick wall to determine “a person’s location, speed and direction.” PhysOrg added, “See Through The Wall (STTW) technologies are of great interest to law enforcement and military agencies; this particular device has the UK Military of Defense exploring whether it might be used in ‘urban warfare,’ for scanning buildings. Other more benign applications might range from monitoring children to monitoring the elderly.”
“Fundamentally, this is a radar system – you’re just using radio waves that have been emitted by an external WiFi router, rather than creating your own,” explained ExtremeTech. “Compare this with MIT’s through-the-wall (TTW) radar, which is 8 feet (2.4m) across and requires a large power source to generate lots and lots of microwaves.”
1. MOVING SUBJECT: When Wi-Fi radio waves bounce off a moving object, their frequency changes. If, for example, a person is moving toward the Wi-Fi source, the reflected waves’ frequency increases. If a person is moving away from the source, the frequency decreases.
2. REGULAR OL’ ROUTER: A Wi-Fi Internet router already in the room fills the area with radio waves of a specific frequency, usually 2.4 or 5 gigahertz.
3. BASELINE SIGNAL: One antenna of the radar system tracks the baseline radio signal in the room.
4. SHIFTED SIGNAL: A second antenna detects radio waves that have reflected off of moving objects, which changes their frequency.
5. PERP, SPOTTED: By comparing the two antennas’ signals, the computer calculates the object’s location to within a few feet as well as its speed and direction.
If you think the answer would be to hold perfectly still in order to avoid detection, to trick it into thinking you are nothing more than a piece of furniture, think again. As Engadget previously pointed out, engineers at the University of Utah developed a wireless network capable of seeing through walls to detect and monitor breathing patterns. In this case, it’s not meant to be a surveillance system, but an inexpensive way to monitor patients’ breathing. …
That’s the juicy bit few realize. If you paint an area with WiFi you can watch people move around in the field, down to the level of detecting their breathing, and hand gestures, through walls. This may be why you have a “smart meter” on your house. Did you have yours removed yet?
One price of this technology is that it could be making you sick. There is research showing that WiFi has non-thermal negative biological effects.
Ninth-graders design science experiment to test the effect of cellphone radiation on plants. The results may surprise you.
Photo courtesy of Kim Horsevad, teacher at Hjallerup Skole in Denmark.Five ninth-grade young women from Denmark recently created a science experiment that is causing a stir in the scientific community.It started with an observation and a question. The girls noticed that if they slept with their mobile phones near their heads at night, they often had difficulty concentrating at school the next day. They wanted to test the effect of a cellphone’s radiation on humans, but their school, Hjallerup School in Denmark, did not have the equipment to handle such an experiment. So the girls designed an experiment that would test the effect of cellphone radiation on a plant instead.The students placed six trays filled with Lepidium sativum, a type of garden cress into a room without radiation, and six trays of the seeds into another room next to two routers that according to the girls calculations, emitted about the same type of radiation as an ordinary cellphone.Over the next 12 days, the girls observed, measured, weighed and photographed their results. Although by the end of the experiment the results were blatantly obvious — the cress seeds placed near the router had not grown. Many of them were completely dead. While the cress seeds planted in the other room, away from the routers, thrived.