Imagine the following scenario:

You walk into a store to buy a microwave. After choosing one, you proceed to the checkout counter, where the employee tells you:

​”We will sell you this microwave under the following conditions: First, you must allow us* to read every email that you write or read on your mobile phone/device from now on. This includes any private emails that you may send or receive from lovers, friends, business and personal acquaintances, and anyone else who communicates with you. Second, you must allow us* to read any SMS messages that you send or receive. Third, you must allow us* to watch and listen to everything you do or say from now on, via the microphone and camera on your mobile device. This includes private moments – intimate moments with your spouse or lover, moments when you’re showering, preparing for work or for play – moments when you would expect a level of privacy. Fourth, you must allow us* to read your contacts, send messages to them on your behalf (without your knowledge or consent), then read any replies to those messages, and delete them before you see them if we so choose. Fifth, you must allow us* to make phone calls on your mobile telephone without your knowledge, and you agree to pay any charges incurred for these calls. Sixth, you must allow us* to modify you contacts list, or any other element of your mobile phone/device that we may choose. This includes, but is not limited to: turning off the ringer/vibration function, powering up your device after you have turned it off, or disconnecting you from your WiFi, and reconnecting you to a WiFi of our choosing. Seventh, you must allow us* to listen to and record every phone call to or from your mobile device, and distribute it to anyone we choose.”

*’us’ includes Our Corporation, and any/all employees, sub-contractors, and over-seas workers we may ever hire.

“So now, just press the “I Accept” button on the checkout register to agree to these terms, and we can sell you the microwave”

I suspect very few people would agree to these terms in order to buy a microwave oven. Yet nearly everyone agrees to terms just like these when they download the average mobile application. For example: it was recently discovered that all of the ten most popular ‘flashlight’ apps for mobile phones includes such agreements and equivalent malware. This report on Fox News confirms this statistic:

http://www.foxnews.com/on- air/special-report-bret-baier/ blog/2014/10/01/cybersecurity- threat-could-be-lurking-your- phone

And it’s not just flashlight apps. Nearly every free app that you download requests permissions that are absolutely not necessary for the functions performed by the app. Over half the free Bible apps (apps that read Bible passages aloud) for example, request permission to access your contacts, read and write SMS messages, read your emails, turn on your camera and microphone, and make phone calls. If you are running one of these apps, then you have agreed to their terms. You can’t run any app without agreeing to their terms.

If you have any doubts, then I recommend you download DCentral1 (A Future Tense Central product) from Google Play, and let it scan your Android phone or device. It will tell you exactly what every app you have downloaded has asked permission to do – and you will be shocked. DCentral1 is my own app, and it asks for no permissions, as you will verify prior to installation.

https://play.google.com/store/ apps/details?id=com.dcentral1. android&hl=en

The question you have to ask yourself is: Why do you gladly accept outrageous terms and invasions of your privacy in order to get an app you want? You would never dream of accepting these terms when buying something like a lawn mower, microwave, car or even a house. I’m baffled.

Some of you are aware of this gross intrusion, while many others doubt that a mobile app could have the capabilities described above. It does sound like science fiction, or possibly rampant paranoia – yet it is real. Anyone can download one of the thousands of spyware applications, many for free, and can remotely plant the software on anyone’s device — anyone — a spouse, a boss, a neighbor, a teacher, a parent, the local sherrif — anyone. The world’s largest Spyware manufacturer – Finfisher – was recently hacked, and thousands of it’s internal documents showed up on Wikileaks, including much of their source code for the spyware – meaning anyone can have access to it. Here is the story about the hack:

http://www.zdnet.com/top-govt- spyware-company-hacked-gammas- finfisher-leaked-7000032399/

The following links to FinFishers sales videos, showing the astonishing capabilities of spyware, should be a real eye opener. Keep in mind this is only one of thousands of companies who manufacture spyware for mobile devices.

http://www.zdnet.com/top-govt- spyware-company-hacked-gammas- finfisher-leaked-7000032399/

https://wikileaks.org/ spyfiles/files/0/303_GAMMA- 201110-FinSpy_Mobile.mp4

https://wikileaks.org/ spyfiles/docs/gamma/301_ remote-monitoring-and- infection-solutions-finspy. html

https://wikileaks.org/ spyfiles/docs/gamma/308_ remote-monitoring-and- infection-solutions-finfly- web.html

https://wikileaks.org/ spyfiles/docs/gamma/309_ remote-monitoring-and- infection-solutions-finfly- isp.html

https://wikileaks.org/ spyfiles/docs/gamma/306_ tactical-it-intrusion- portfolio-finusb-suite.html

https://wikileaks.org/ spyfiles/docs/gamma/300_ tactical-it-intrusion- portfolio-finintrusion-kit. html

https://wikileaks.org/ spyfiles/docs/gamma/302_it- intrusion-training-program- fintraining.html

#LegalizeFreedom

John McAfee

2014