Government documents obtained exclusively by Infowars expose massive DHS domestic spy grid designed to track citizens in real time through mega government databases.
November 12, 2013
Exclusive documents obtained by Infowars from an insider government source have revealed the true origin and nature of the highly secretive ‘mesh network’ spy grid that has garnered massive media attention due to the fact that the network’s strange downtown Seattle spy boxes can track the last 1,000 GPS locations of cellphone users. But as new documents reveal, the grid is far deeper than the media is telling you. The Seattle DHS spy system ultimately ties in with an enormous stealth database that acts as an intelligence hub for all of your personal data.
On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project document that we have obtained, a diagram reveals the system’s basic communication abilities in regards to the Port of Seattle that the DHS has refused to comment on despite funding with millions in taxpayer dollars:
The Infowars team is closely reviewing the document and will publish it in whole soon. More images seen in the extensive documentation:
The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions.
Labeled by their intersection location such as “1st&University” and “2nd& Seneca,” the multiple network devices are easily detected in Seattle’s downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return.
“How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?” asked Seattle newspaper The Stranger.
According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.
So far Seattle police have been tight-lipped about the network’s roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement.
According to The Stranger’s investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy.
Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagrams attached to a March 2012 proposal request (# DIT-2996), which have since been approved, updated and finalized, are publicly viewable at the Seattle.gov website.
Several connections can be made by studying the diagram, including its now apparent link to Seattle’s public waterfront. The recent instillation of 30 Department of Homeland Security-funded surveillance cameras on Seattle’s popular waterfront, complete with mesh network devices attached, were purported to increase the Port of Seattle’s protection against such acts as terrorism. Residents soon discovered multiple cameras facing inward toward Seattle homes, not towards the coast line as allegedly intended. The “accident” was later remedied by city officials.
While unknown members of multiple law enforcement agencies will have access to the mesh network, so will the Seattle Fusion Center, where FBI and Homeland Security gather data on Americans deemed “extremist” for such crimes as “loving liberty.” Incredibly, even the U.S. Senate called the Fusion Centers a “useless and costly effort that tramples on civil liberties” in a 2012 bi-partisan report.
Page 65 of the public document details the information-collecting capabilities of the Mesh Network Mesh System (NMS), revealing its ability to collect identifying data of anyone “accessing the network.” Although the document details an alert system for reporting unauthorized access, a public user guide from a similar Aruba software program lists the ability to collect “a wealth of information about unassociated devices,” validating fears of local residents who walk through the mesh network’s perimeter.
“The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
The bottom left of the diagram shows what may be the Seattle Department of Transportation Intelligent Transportation Systems Network, linked directly into the mesh network. According to the Department of Transportation website, the system controls several surveillance related items such as license plate readers and closed circuit TV (CCTV) systems.
An early draft of the diagram appears to show Seattle police vehicle’s ability to receive and “control” certain aspects of the mesh network. Whether police were originally intended to control surveillance cameras from their vehicles, including their panning, tilting and zooming abilities, remains unclear. According to statements made by Seattle’s Assistant Chief Paul McDonagh last February regarding the waterfront cameras specifically, “only a few people would have that capability, so the officer on the street would just have the ability to view it.”
In reality, Seattle is only one of countless cities across the country being flooded with a sea of surveillance equipment. While the public has focused mainly on surveillance issues relating to the NSA, the federal government has continued its 20-plus year dragnet surveillance grid roll out of covert conversation-recording microphones.
As recently reported by Storyleak, multiple cities including Las Vegas have begun using “Intellistreets” light fixtures capable of recording conversations. The device has received increased scrutiny since 2011 when their “Homeland Security” application, which shouts government messages from a loudspeaker system, was widely revealed to the public.
Other audio recording devices like the ShotSpotter microphones, allegedly used to analyze the location of gun shots, have been found to record conversations of unsuspecting city residents.
Despite the federal government’s constant justification of throwing away civil liberties in the name of fighting terrorism, which kills less Americans than bee stings, continued NSA revelations show that the federal government’s continued surveillance system build-up is aimed at everyday Americans, not foreign Al Qaeda admittedly supported by the U.S. government in Syria.
Mikael is an accomplished writer and lead features writer at Storyleak whose articles have been featured on sites such as the Drudge Report and others. During his time at Examiner.com, he was frequently ranked the number one political writer.
Also, make sure to get your boost of zinc and pregnenolone today with The Real Red Pill now at 50% off!