Stop Big Tech Surveillance With This 4-Dollar Anti-Big-Brother Trick!

Big Brother: Facial Recognition Surveillance And CV Dazzle
Jeff Anderson
Jeff Anderson, Editor

If you’re like me, you worry about how much surveillance our government has us under.

They’re spying on our phone conversations.

They’re reading our messages.

They’re tracking our movements.

And the “Big Tech” social media companies are helping them do it.

But one thing most people aren’t worrying about right now – even though they should – is facial recognition.

“Facial recog” technology is becoming more and more common, especially in the UK – and while people aren’t talking about it here right now, they really should be.

(During the recent protests in Hong Kong, the Communist Chinese government used facial recognition to identify and ‘disappear’ protesters, who fought back by wearing masks.)

That scares me, because it’s only a matter of time before we see this technology used more and more in our own country.

But it turns out there’s a low-tech way to defeat this type of Big Brother surveillance… and it will only cost you a couple bucks!

The 4-Dollar Trick That Defeats Facial Recog

Big Brother: Facial Recognition Surveillance And CV Dazzle
Big Brother: Facial Recognition Surveillance And CV Dazzle

There are 30 million surveillance cameras in the United States, according to one report.

Disturbing as that is, it’s NOTHING compared to the per-capita number of cameras in the UK.

But citizens in the UK, tired of Big Brother spying on them all the time, have decided to do something about it.

They’re painting their faces.

That’s right: They’re creating patterns of lines and geometric blocks on their faces, which interferes with the ability of facial recog to clock them and compare them to a database.

The group in the UK calls itself the “Dazzle Club,” a reference to “Computer Vision Dazzle”.

“You’re trying to obscure the natural highlights and shadows on your face,” a member of the Dazzle Club told the outlet Vice in the UK. “Cameras will reduce you down to pixels. They’ll pick up the bridge of your nose, your forehead, your cheekbones, your mouth and chin. So you have to flatten your face and obscure it.”

In other words, all it takes to throw a wrench into the bazillion-dollar tech industry’s surveillance state…

…is a four-dollar camouflage makeup kit.

(We even recommended, years back now, that you put one of these in your bug-out bags and survival kits so you could use it for disguise – so you might already have one!)

Now, if you weren’t worried about facial recognition before, that’s okay.

I wasn’t worried about it either, until I started investigating these infringements on our freedoms and our privacy.

But this type of technology is not the ONLY way that “Big Tech” and “Big Brother” spy on you, steal your data, and use it against you.

I know, because…

I did my own research.

I talked to digital experts (skip-tracers, hacking experts, federal whistleblowers, Constitutional attorneys, etc.).

And I was SHOCKED at what I discovered!

But then I took action…

Based on these cyber-security experts’ advice, I deleted certain apps on my phone… I learned how to put a “force-field” around my phone and computerhow to be “invisible” when I buy gear and supplies online… and I even learned how to actually USE information they collect against them to take back control of what they see!

And trust me, even though I have a website and “online stuff”, I am NOT a “tech-savvy” dude by any stretch of the imagination!

Camouflage Kit
Camouflage Kit

In other words, if I can do it, you can do it.

In fact, I took insane notes from everyone I talked to and made a step-by-step guide to help me erase any trace of the information Big Tech and the government might use against me.

(BTW… if you want my notes and “how-to” blueprint, I put them all inside the “Digital Ghost Protocol” manual you can check out here if you want to see it…)

Look… none of us wants to be under surveillance, right?

But it’s up to US – you and me – to protect our movements, our freedom, and our data, especially with our government, these giant tech companies, and even hackers and online criminals looking to snoop into our lives.

Don’t take this lightly.

The threat to your information and your identity is only going to get worse, and you and I need to change the way we do things to stay off Big Tech’s radar.

It’s not hard, but you do need to start now – so check out how to protect both your freedoms and your identity with my Freedom War and Digital Ghost Protocol programs.

We all need to be extra careful these days, you know?

Have You Had Any “Freaky” Tech Experiences With Government Or Corporate Spying?

Please Share Your Thoughts And Experiences Below…

Hacker Defense: The Internet Fight Against Big Tech, Big Data, And Surveillance

Hacker Defense: Freedom Fight Against Big Tech, Big Data, And Your Government
Jeff Anderson
Jeff Anderson, Editor

Keeping your life private in this day and age of total surveillance isn’t easy.

That’s because it isn’t just your government that’s spying on you.

We’re all under constant threat of identity theft and other forms of electronic fraud, too.

You might be surprised to learn, though, that the biggest threat to your online privacy…

…IS YOU!

Recently I talked to privacy expert Frank Ahearn about what you can do to stop endangering your own private data.

Here’s a summary of what he told me.

Freedom Fight: How To Stop Hackers & Government Spies From Targeting You On The Internet!

Hacker Defense: Freedom Fight Against Big Tech, Big Data, And Your Government

Frank Ahearn

Do you want more privacy?

Do you want your data to be more protected?

Well, the first thing you’ve got to do is actually stop and THINK about what you post online and what you search for.

Have you ever Googled an idea?

Searched for a hotel?

Posted your private thoughts to Facebook?

Every time you do that, you’re creating connections.

You’re establishing a network of data that CAN be traced back to you.

Here are three questions you need to ask yourself every time you use your computer, your tablet, or your phone… to make sure the hole in your “personal firewall” isn’t one YOU made.

1. What Connections Did You Create Today?

Privacy is based on our connections.

It’s about how we connect to other people.

Anytime someone feels the need to create some privacy and disappear, they need to STOP what they are doing and they need to find a new connection that CANNOT be attached to them.

Think backwards, and think about the things you searched.

Most people and most investigators (and even predators) will look for what a person has left behind.

  • What was it you last searched on your computer?
  • What phone calls did you make?
  • What emails did you send and receive?  Did you use the computer for directions to where you are going?
  • Did you search for the weather at that locale?
  • Did you do some online shopping that could otherwise lead someone to you?

2. Are You Using Privacy Software?

Most people don’t think to use privacy software.

Why not?

It’s available and you should start using it.

An IP blocker or anonymizer, a prepaid cellphone… these things are NOT private.

They may be private on YOUR end, but they’re not private on the receiver’s end!

When you walk into a store and buy a prepaid phone, there is a camera watching you.

You are therefore traceable to that service.

You need to think about online and offline privacy in that sense, in terms of the connections your actions make.

The other reason you need privacy software is that the “secure” websites you are using are only as secure as the people running them.

Every day we hear about compromises of personal data, in which third-party locations see breaches that expose your account data.

Just because someone shows you a baseball with Babe Ruth’s signature on it does not mean that baseball is authentic, and just because a website has a fancy seal on it does not mean it’s actually secure.

What Are You Volunteering?

When you use free online services, like Gmail, you are voluntarily giving up a goldmine of personal data.

Your information is scanned and extracted and that information is very valuable.

Just because you delete online information, or shut off your cellphone, or shut off your utilities and cable, doesn’t mean that information goes away.

It is always within the system. 

Before you shut things down, start deviating from known information about you on those accounts.

This way, when you leave, they don’t have correct information to use to trace you.

When considering the privacy mistakes you are making, always think in terms of the connections you establish, especially when you volunteer parts of your data and your life.

YOU will always be the greatest threat to your own data security.

Have You Ever Done Anything Online That You Knew Probably Wasn’t Safe? Have You Had Your Identity Or Your Data Stolen?

Please Share Your Thoughts And Experiences Below…