Dolphin Attack: How to hack your voice command
Hacking Phones Via Ultrasound & the enslavement of all Humanity
If you have Speech recognition systems like Siri or Google Cortana and Alexa and made your phone, computer and even our home voice controllable, dial phone numbers, play music, adjust thermostats, or even unlock doors without touching your phones...
you become vulnerable to such an attack.
A study conducted at Zhejiang University in China has shown that such speech recognition systems are vulnerable to hidden commands that the researchers are calling “Dolphin Attacks.”
How do you hide a voice command?
Make it ultrasonic.
Humans hear sounds between 20 Hz and 20kHz.
If you record a phrase, and shift it above 20 kHz, then play it back, you can’t hear it, but dogs, bats, dolphins and, unfortunately, phone and computer microphones can.
Such attacks can be and are hidden in such things as TV shows and even popular music.
https://www.hackread.com/wp-content/uploads/2017/09/dolphinattack-siri-and-alexa-can-be-hacked.pdf
Security researchers have warned that voice assistants made by the likes of Amazon, Google and Apple could be ‘hacked’ by remote attackers broadcasting commands in ultrasonic frequencies.
Researchers in China found that broadcasting the commands via a loudspeaker enabled them to activate the assistant from several meters”.
Remote attackers could therefore theoretically trick the device into making phone calls to premium rate numbers, visit malicious websites, take photographs and issue other commands at inaudible frequencies.
They could do this in proximity to the victim or even hide these commands in online videos Netflix Amazon Youtube you name it they steal it.
The capabilities of this technology are infinite.
And you won't hear a thing.
The researchers tested the hack on 16 VCS (Version Control System) models including Apple iPhone, Amazon Echo, Google Nexus and connected cars.
The research team stated that the commands could be anything from a simple command like “Hey Siri” to forcing the iPhone to open a malicious website or even asking Nexus 7 to call on “1234567890”, or Amazon’s Echo could be asked to “open the backdoor.” Attackers can easily push an Audi Q3 to change its navigational system settings and add a new location. The consequences are various and truly diverse, and not to forget dangerous as well.
That’s because adversaries can try to manipulate the software of voice assistant in any possible way. It is safe to say that the seemingly harmless, human-friendly programs have huge security repercussions.
To check how each voice assistant reacted to hacking, the researchers used a smartphone and $3 hardware including small speaker and amp. They noted that the exploitation is enabled by both hardware and software problems. The software that powers voice assistants like Google Home, Siri and Alexa, and microphones installed in the device can pick up frequencies above the average human ear limit of 20khZ and perform all sorts of tasks as narrated to them by the hacker.
The Chinese research team identified that every mainstream voice assistant has the same flaw when it comes to commands rendered from above 20khZ. We can assume that the higher the level of user-friendliness the greater will be the vulnerability of any software. We use web browsers that can collect cookies without notifying us to let marketers track us on the web; we store our data on the Cloud where hackers can easily steal it to sabotage our private lives; and now there are the voice assistants that although promise to made our life easier but actually can prove to be detrimental to our privacy.
A similar US study at Princeton also demonstrated a real-world attack using inaudible voice commands on an Android phone and an Amazon Echo device “with a high success rate at a range of 2-3 meters”.
So let me get this straight... If you are that stupid and you listen to shit like "Lady GaGa" and drive a Tesla which you would in self drive mode which you would and such a command would be hidden in a song which it could... it could speed up your car... turn right... turn left... and crash your car with you in it and you won't have a chance.
And there is another problem with this technology... In-Q-Tel.
In-Q-Tel, formerly Peleus and In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies to keep the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability.
I mean a Not for profit venture capital firm is a contradiction in itself.
And since we know that the CIA usually is involved in overthrowing anything they don't like, installing puppets for the puppet masters and creating War like they did in Ukraine we can quite rightfully assume that they not only know this technology but they use it for sinister purpose.
And all secret agencies share information secretly... they all work together... they all have this information.
And since the purpose of In-Q-Tel is technology infiltration we can and must assume that all of the manufacturers of all devices are all infiltrated.
This means that every device capable of voice command is by design open to those attacks.
And since Google Microsoft Facebook Apple & Tesla are all connected to the Israeli Unit8200 who has like the CIA a foothold in this technology every person that has a carrier like a Smartphone is vulnerable to an attack.
In-Q-Tel Engagement. The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is committed to providing the best scientific, R&D, and test and evaluation support to find innovative and cutting-edge technology for our Department of Homeland Security (DHS) partners. One such resource is DHS's work with In-Q-Tel (IQT).
https://www.dhs.gov/science-and-technology/iqt
And it gets worse.
If for instant you will have like they want you to a smart home with voice activated entry and control it is easier to break into steal or do anything than ever before…
In fact they can remotely tell if you are in the house when you leave when you enter what you do when you shit what you have in the fridge when you shag who you shag…
They will have total control over you…
And if you then live in a smart city they know exactly where you are at all times so when you are not there they can just walk in and look and take anything.
Worse they can plant anything in your house and then blame it on you.
So if you are for instant a political dissident like me they can plant anything from Drugs to Child pornography to stolen artifacts…
And one thing you must not forget…
The MOSSAD is the greatest producer of Child Pornography in the whole world…
And it gets worse.
Bluetooth Low Energy
Bluetooth Low Energy is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group.
Bluetooth Low Energy (BLE) is a specification that defines protocols for discovery and communication between power-efficient devices. Discovery of devices is done through the Generic Access Profile (GAP) protocol.
After discovery, device-to-device communication is done through the Generic Attribute (GATT) protocol.
The hidden difference is that Bluetooth Low Energy remains in sleep mode unless a connection initiates. The actual connection times only last a few milliseconds, unlike Bluetooth, which connects for a few seconds or a few hours at a time. These short connections are necessary because data rates are significantly higher (1 Mb per second).
https://www.link-labs.com/blog/bluetooth-vs-bluetooth-low-energy
There is more
You probably have heard of Apple Air Tag.
Now Apple Air Tag uses exactly this technology BLE... creating a mesh network of infinite capabilities.
I assume that even if an Apple device is switched off it can transmit BLE.
Such things are known and because In-Q-Tel and Unit8200 of the IDF both have vested interest in harnessing this technology and their operatives are actively pursuing this technology we must rightfully assume that no device on the market today is safe.
To show you just how powerful this technology is here is a short clip from the Batman Movies with Morgan Freeman.
To say that this technology BLE alone is unethical and dangerous is very conservative.
But in combination with an Ultrasound Dolphin attack it even is worse.
With Apple officially launching support for digital ID and mobile driving licenses (mDLs) in the Apple Wallet in Arizona and plans to roll out the support to Connecticut, Iowa, Kentucky, Maryland, Oklahoma and Utah in 2022, the connection of Apple to Unit8200 and the CIA to BLE and Dolphin attacks it is a surveillance State of infinite proportions rolled out without consent and without knowledge of the unsuspecting masses.
In a great leap forward for the seamless travel journey, the digital ID will be accepted by the Transportation Security Administration (TSA) at checkpoints in approved airport locations, with Phoenix being among the first. It will also be an available option for TSA PreCheck travelers. At the checkpoint, travelers just tap their iPhone or Apple Watch at the TSA’s credential authentication technology (CAT) reader. Using near-field communication (NFC), a secure connection is established between the user device and the CAT reader. The user is provided the opportunity to review what information will be shared with the TSA for the verification process.
https://www.passengerterminaltoday.com/opinion/apples-support-for-digital-id-marks-important-milestone-in-the-seamless-passenger-journey.html
And the Government knows of this technology yet pushes this digital ID knowingly and willingly because the Government already plans for a Global Dictatorship in the making.
And this is because the Government is out of control and pursues private Interests against its citizens.
That is every Government everywhere.
Cooperate Interests are manipulated by the CIA MOSSAD and Unit8200 actively and purposefully with full knowledge of the implications of this technology.
There is a word for the cooperation of Government and Private interest and it is called Fascism.
Dr. Robert Malone calls this Inverted Totalitarianism
The corruption of political systems by global corporatists has filtered down to our science, medicine and healthcare systems and must be exposed. The nation and its governing arms (including the intrenched bureaucracy often referred to as the “deep state”) now primarily serves the interests of multinational corporations, their managers and owners, instead of the other way around- serving the people.
I call it Good old Fascism.
And it gets worse...
Since the Sept 11 terrorist attacks, New York’s leadership has adopted anti-terrorism strategies to protect Lower Manhattan that increased police surveillance of the area and deterred further attacks. While these ushered in a new approach to public safety, they transformed how cities are managed as well.
The “smart city” movement is a global effort by city governments to harness technologies for improved city management—puts massive data collection front and center. The central premise is that clear, real-time data inputs about everything from traffic flow to air quality can lead to more efficient responses and better outcomes for city residents.
https://www.weforum.org/agenda/2021/09/smart-cities-9-11-technology/
“There were a lot of learnings there about the power of technology to be leveraged for real-time, situational awareness or detection of anomalies,” says Jeff Merritt, a former director of innovation for the city of New York who now heads urban initiatives at the World Economic Forum.
This model for an integrated public-private monitoring network that fed data points back to a central monitor was innovative for its time, and one that many other cities replicated, right down to the technology. In 2012, the city of New York partnered with Microsoft to expand this technology into a program called the Domain Awareness System, which Microsoft licensed to other law enforcement jurisdictions.
And what that even is worst of all that the instigators of the 9/11 attacks such as the Rothschilds Warren Buffet Bill Gates Klaus Schwab who all were in New York having Breakfast with their Rabbis (in the case of Klaus Schwab) witnessing the Destruction of their making from their apartments or in the case of Warren Buffet from Offutt Air Force Base (Nebraska) are now pushing these "smart cities" upon the unsuspecting masses.
Additionally the Governments are actively pushing electric cars and self driving autonomous vehicles.
And that is all for a very good Reason.
Combine all what you learned in this article together
How this all will end up I wrote earlier here.
The World economic Forum the CIA the Mossad Unit8200 they all work together.
The WEF acts like the overlord for Governments.
They are behind those technologies like Dolphin attack BLE mesh Network smart cities self driving cars and so on.
Each on its own those technologies are very dangerous.
Add together Elon Musk and His Neural Lace Neural Link Starlink Open AI Boston Dynamics Hyperloop Boring & TSLA Robotics it becomes much clearer.
Combine them together and it becomes unquestionable the most megalomaniac plan in this world that makes Adolf Hitler in his heydays like an infant playing with children's toys.
It will make out of this planet a prison of galactic proportions.
With no place to hide.
With no route to escape.
Evil squared by infinity.
Fritz Freud.
I like humans, and I like some machines. I do not trust humanized machines or electronics. No cell phone. Shitty car with one AM/FM speaker. All one needs. I enjoy life and talking to people who's heads are looking up and not down.