Prepare To Bug Out Fast And Destroy All Electronic Devices – Tag And Bag Technology Makes You A Sitting Duck For Round-Up Or Extermination All Depending on What ‘List’ You Are On

Wednesday, November 11, 2015
By Paul Martin

By Susan Duclos
All News PipeLine
November 10, 2015

New technological “advancements” show how easily we have all been set up to be tagged and bagged, led like sheep to our own slaughter, manipulated and controlled by our very own government.

At All News PipeLine we have extensively covered preparation and survival in the case of a major catastrophe, whether it is weatherrelated, a solar event, an attack on U.S. soil, a cyber attack against infrastructure, or an economic collapse – and we have highlighted the recent slew of mainstream media articles pointing towards an expected EMP event, but while researching this article I have come to the conclusion that for those prepping, for survivalists, an EMP may actually be the one event that saves your lives.


Before delving into the recent technological “advancements,” it is critical to remember what and, more importantly, who was exposed by Edward Snowden in 2013 when the whistleblower provided classified documents showing that the NSA had expanded its domestic spying by collecting users’ details from Microsoft, Yahoo, Google, Facebook, Paltalk, YouTube, Skype, AOL and Apple, just to name a few. (See more at The Gurdian article titled “NSA Prism program taps in to user data of Apple, Google and others.”)

By the end of 2013 we learned that the U.S. government could prevent your cellular phone from being turned off, it would buzz, it will show the usual power-off animation, the screen would go black but, in the words of a CNN report “it’ll secretly stay on — microphone listening and camera recording.”

Via TruthInMedia on that topic we see the following:

According to Der Spiegel’s website:

“The NSA’s ANT division develops implants for mobile phones and SIM cards. One of these is a spyware implant called “DROPOUTJEEP” — designed for the first generation of iPhones — which was still in development in 2008, shortly after the iPhone’s launch. This spyware was to make it possible to remotely download or upload files to a mobile phone. It would also, according to the catalog, allow the NSA to divert text messages, browse the user’s address book, intercept voicemails, activate the phone’s microphone and camera at will, determine the current cell site and the user’s current location, “etc.” ANT’s technicians also develop modified mobile phones, for use in special cases that look like normal, standard devices, but transmit various pieces of information to the NSA — that can be swapped undetected with a target’s own mobile phone or passed to informants and agents. In 2008, ANT had models from Eastcom and Samsung on offer, and it has likely developed additional models since.”

The numerous examples of other domestic spying programs and devices would literally fill pages and pages, so we are focusing on the the Snowden revelations because specific companies are listed, the sames ones where recent “advancements” have been publicized, and the information on electronic devices because those two points are the most relevant in connecting the dots and understanding why when the time comes to bug out the first thing that will need to be done will be to destroy your electronic devices, Ipads, Laptops, smart-phones, etc….

The Rest…HERE

Comments are closed.

Join the revolution in 2018. Revolution Radio is 100% volunteer ran. Any contributions are greatly appreciated. God bless!

Follow us on Twitter