Big Tech Surveillance: Stop Facebook, Google, & Amazon From SPYING On You!

Stop Big Tech From Spying On You: Alexa, Google Home, Facebook Listening
Jeff Anderson
Jeff Anderson, Editor

Hey, let me ask you:

Have you ever been talking about something, or maybe even just searching something online…

…and then an ad for that exact thing comes up on your Facebook page?

If it’s something you visited or searched for on the Web, that’s just a simple matter of “cookies” – those data files placed on your computer or phone by the sites you visit, so ads can read this information on other sites.

But if it’s just something you TALKED about, something you didn’t enter into your computer or phone…

…there’s only one way Facebook could have that, isn’t there?

In other words, the app on your phone is using the microphone to SPY ON YOU… and it’s NOT the only device you’ve got to watch out for!

This 1 Step Stops Google Home, Amazon, Alexa, and Facebook From Listening To You!

Stop Big Tech From Spying On You: Alexa, Google Home, Facebook Listening
Stop Big Tech From Spying On You: Alexa, Google Home, Facebook Listening

Now, I’m not trying to get all paranoid here, but we’ve all experienced that weird thing where Facebook puts up ads for things we talked about.

Facebook claims they’re not doing it…

…but then, they were fined 5 BILLION DOLLARS by the FTC last summer for violating users’ privacy rights.

And Google?

The FTC fined them 170 MILLION BUCKS for collecting information on your kids through Google’s YouTube app.

Then there’s the Amazon Alexa device, which is always listening to you.

We know, first because the company admits it… but also, because in 2018 a judge ordered Amazon to turn over two days worth of Alexa records to help solve a double murder case.

(In other words, they KNOW it’s listening in and recording what it hears, or they wouldn’t ask for the information!)

Well, there’s 1 thing you can do to stop all this spying right now:

Turn Off The Microphone!

That’s right.

There’s a button right on the Amazon Echo devices that mutes the microphone.

There are also settings in the app for Amazon and Google that let you turn off the microphone, or deny the permissions the app needs to access it.

The same is true for your Facebook app.

Now, yes, if you want to use these apps and devices, you have to turn the mike back on to use them… but when you want your privacy back, all you have to do is switch off the microphone permission and you’re good to go.

Yes, it’s that simple!

But I’m willing to bet almost nobody does it… because I didn’t think to before I started investigating these infringements on our freedoms and our privacy.

But that’s not the ONLY way that “Big Tech” spies on you, steals your data, and uses it against you.

I know, because…

I did my own research.

I talked to digital experts (skip-tracers, hacking experts, federal whistleblowers, Constitutional attorneys, etc.).

And I was SHOCKED at what I discovered!

But then I took action…

Based on these cyber-security experts’ advice, I deleted certain apps on my phone… I learned how to put a “force-field” around my phone and computerhow to be “invisible” when I buy gear and supplies online… and I even learned how to actually USE information they collect against them to take back control of what they see!

And trust me, even though I have a website and “online stuff”, I am NOT a “tech-savvy” dude by any stretch of the imagination!

In other words, if I can do it, you can do it.

In fact, I took insane notes from everyone I talked to and made a step-by-step guide to help me erase any trace of the information Big Tech and the government might use against me.

(BTW… if you want my notes and “how-to” blueprint, I put them all inside the “Digital Ghost Protocol” manual you can check out here if you want to see it…)

Look… none of us wants to be spied on, right?

But it’s up to US – you and me – to protect our data, especially with our government, these giant tech companies, and even hackers and online criminals looking to snoop into our lives.

Don’t take this lightly.

The threat to your information and your identity is only going to get worse, and you and I need to change the way we do things to stay off Big Tech’s radar.

It’s not hard, but you do need to start now – so check out how to protect both your freedoms and your identity with my Freedom War and Digital Ghost Protocol programs.

We all need to be extra careful these days, you know?

Have You Had Any “Freaky” Tech Experiences With Government Or Corporate Spying?

Please Share Your Thoughts And Experiences Below…

Hacker Defense: The Internet Fight Against Big Tech, Big Data, And Surveillance

Hacker Defense: Freedom Fight Against Big Tech, Big Data, And Your Government
Jeff Anderson
Jeff Anderson, Editor

Keeping your life private in this day and age of total surveillance isn’t easy.

That’s because it isn’t just your government that’s spying on you.

We’re all under constant threat of identity theft and other forms of electronic fraud, too.

You might be surprised to learn, though, that the biggest threat to your online privacy…

…IS YOU!

Recently I talked to privacy expert Frank Ahearn about what you can do to stop endangering your own private data.

Here’s a summary of what he told me.

Freedom Fight: How To Stop Hackers & Government Spies From Targeting You On The Internet!

Hacker Defense: Freedom Fight Against Big Tech, Big Data, And Your Government

Frank Ahearn

Do you want more privacy?

Do you want your data to be more protected?

Well, the first thing you’ve got to do is actually stop and THINK about what you post online and what you search for.

Have you ever Googled an idea?

Searched for a hotel?

Posted your private thoughts to Facebook?

Every time you do that, you’re creating connections.

You’re establishing a network of data that CAN be traced back to you.

Here are three questions you need to ask yourself every time you use your computer, your tablet, or your phone… to make sure the hole in your “personal firewall” isn’t one YOU made.

1. What Connections Did You Create Today?

Privacy is based on our connections.

It’s about how we connect to other people.

Anytime someone feels the need to create some privacy and disappear, they need to STOP what they are doing and they need to find a new connection that CANNOT be attached to them.

Think backwards, and think about the things you searched.

Most people and most investigators (and even predators) will look for what a person has left behind.

  • What was it you last searched on your computer?
  • What phone calls did you make?
  • What emails did you send and receive?  Did you use the computer for directions to where you are going?
  • Did you search for the weather at that locale?
  • Did you do some online shopping that could otherwise lead someone to you?

2. Are You Using Privacy Software?

Most people don’t think to use privacy software.

Why not?

It’s available and you should start using it.

An IP blocker or anonymizer, a prepaid cellphone… these things are NOT private.

They may be private on YOUR end, but they’re not private on the receiver’s end!

When you walk into a store and buy a prepaid phone, there is a camera watching you.

You are therefore traceable to that service.

You need to think about online and offline privacy in that sense, in terms of the connections your actions make.

The other reason you need privacy software is that the “secure” websites you are using are only as secure as the people running them.

Every day we hear about compromises of personal data, in which third-party locations see breaches that expose your account data.

Just because someone shows you a baseball with Babe Ruth’s signature on it does not mean that baseball is authentic, and just because a website has a fancy seal on it does not mean it’s actually secure.

What Are You Volunteering?

When you use free online services, like Gmail, you are voluntarily giving up a goldmine of personal data.

Your information is scanned and extracted and that information is very valuable.

Just because you delete online information, or shut off your cellphone, or shut off your utilities and cable, doesn’t mean that information goes away.

It is always within the system. 

Before you shut things down, start deviating from known information about you on those accounts.

This way, when you leave, they don’t have correct information to use to trace you.

When considering the privacy mistakes you are making, always think in terms of the connections you establish, especially when you volunteer parts of your data and your life.

YOU will always be the greatest threat to your own data security.

Have You Ever Done Anything Online That You Knew Probably Wasn’t Safe? Have You Had Your Identity Or Your Data Stolen?

Please Share Your Thoughts And Experiences Below…

[Free Speech?] Leaked NSA Documents Show Best Way To Stay Anonymous

What did you Google last week?

You probably can’t remember.

  • You got curious about a news story on domestic terrorism and searched the topic to learn more.
  • Found what you were looking for, closed the tab, forgot all about it.
  • Maybe you bought some ammo last week. Or a book. Or a bug out bag.
  • Maybe you went to a gun show.
  • Maybe you attended a political rally.

Meanwhile, behind the scenes, all of those little things you did were translated into data.

And somewhere in a three-letter agency, you got flagged.

You fit the profile. You’re a “person of interest.”

And they know where you live.

That’s why you need to know. . .

How To Stay Anonymous While The Government Tries To Invade Your Privacy

Leaked NSA Tips To Stay Anonymous
Leaked NSA Tips To Stay Anonymous

This isn’t paranoia.

This is a fact.

Every item you buy, every place you go, every topic you search is tracked online.

  • Got a smartphone? It tracks your location.
  • Use a digital wallet? It knows what you bought and where you bought it.

Companies collect that data to sell you more stuff.

Then they sell that data to the alphabet agencies, who use it to try to track down “enemies of the state.”

Now, I’m not telling you this because I want you to go live in the woods with a tinfoil hat on.

I’m telling you that you should take steps to protect your online data from getting collected, so that it can’t be used to profile you.

I’m going to show you how to do that – using the NSA’s own leaked internal documents.

In the NSA’s own words, using the following four services results in a “near-total loss/lack of insight to target communications, presence.”

  • Tor – a web browser that encrypts your web traffic
  • VPN – an encryption service that makes it hard to figure out who’s connecting to the internet and from where
  • CSpace – an anonymous chat service that encrypts files sent over its network
  • ZRTP – an encryption service for voice calls and text

We only have this information because someone ON THE NATIONAL SECURITY ADVISORY failed to protect their own information.

If they’re not protected, you know you’re not protected.

Those four services above are a good start, but if you want to be fully protected against hackers, snoopers, stalkers, and alphabet agencies, you’re going to need our special report: The Death of Freedom.

You already know your information is under attack.

Pick up the paper and see how many stories are out there: data breach, private passwords leaked, internal government documents revealed, hundreds of thousands of credit card users compromised …

You can’t afford to lose your identity, your freedom, or your right to protect yourself and your family.

Learn more by downloading The Death of Freedom here.

What Government Or Corporate Spying Worries You Most? What Steps Have You Taken To Protect Yourself?

Please Share Your Tips In The Comments Below Now…