top of page

Who is engaging in violation of freedom of expression and anti-dissident net operations in Japan?

Updated: Apr 3

#NetSurveillance #SpyAgency #Wikipedia #ウィキペディア #関東総合通信局

Work place example of mass communication surveillance.
Regional Bureau of Telecommunications is net surveillance intelligence agency in Japan. Image: Public Domain

Finding interception points of Japanese Intelligence Agencies and its Partners


Japan’s Net Surveillance Intelligence Agency, Regional Bureau of Telecommunications (総合通信局) and its branch ‘Kantou Regional Bureau of Telecommunications (関東総合通信局).’


For instance, Japanese version of Wikipedia (ウィキペディア) is monitored by this bureau nationwide. And they already violated my human rights and other pro-democracy dissidents’ net pages and accounts on internet for many times personally known from at least 2014 until now.

For specific SNS and sites, their anonymous accounts and dynamic IP addresses (Professional people in this field said what they show is not IP address but it's a bunch of hostnames actually. ) are used for hidden and safe net operations from camouflaged physical addresses. And no notable Japanese dissident intelligentsia mentioned the existence of this intelligence agency in Japan.


Japanese dissidents know CIA, NSA, USFJ but they don't know their domestic intelligence agencies which monitoring them with police and prosecutor


PIN, passcode, turning off GPS, multiple IPs are all useless to prevent monitoring like this.
PIN, passcode, turning off GPS, multiple IPs are all useless to prevent monitoring like this.

Intelligent friend analysed how they monitor people and breaking privacy completely.


Carnivore was completely illegal at the time of its birth


It was a stand-alone PC at every ISP which tapped into the trunkline (A main telecommunications link such as a phone line directly connecting exchanges or switchboards at a considerable distance apart) and isp (internet service provider) account database to sift words and track users via their ISP account regardless of the IP address.


The login for complete access was a simple 4 digit password, and the login screen displayed a large set of teeth and a username/password prompt.


After Carnivore they built large sifting machines, 220 processor Cray computers, which grab 10 words around any spoken or transmitted keyword, and determine the use by context. "that's the bomb" and "i have a bomb" take different data routes.


On a use by context hit, the data is sent to a sifting station, generally well hidden office in public places, with lots of parking (they put pillow cases over their heads when you go in) the people working at these sites accept hits and determine if they are indeed legitimate, or just someone's book report on nuclear arms etc.


The list of keywords is extensive and contains many names taken from children's shows which are used to name black ops projects i.e. Dark Smurf (not a complete keyword) or names like Dark Coder. (it is unwise to speak this name) Once an agent identifies a positive hit, they can place a "watch" on the person.


At that point everything in your life is monitored. Camera hits, ATM withdrawals and pretty much any interaction you have with the world. The intelligence computers integrate with Ships navigational computers, with MS (Microsoft) windows, all router brands and all cell phones without the users knowledge.


If you are extremely unlucky you will receive a google update on your phone containing a "roving bug" (Hot-milking a phone; Using A Smartphone As a Listening Device) this is aside from what is already embedded in our phones by a company named Wirehound.


The Japanese have no clue, that every picture taken on a global basis is scanned for faces. If you take a selfie with someone near the top of the list, your GPS turns itself on, and uploads the photos, location and full contents of your phone using machine language code hardwired into the actual chips.


Hacking your phone does not grant access to apps permanently embedded in this ROM (read only memory) area. I could get a lot more technical here, with the way they see straight through PGP (an email encryption program) encryption and scan encrypted words as if they were plain text.


Basically the sifters contain universal keys which provide a pre encrypted pattern to search for. The most