<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Tactical Hermit]]></provider_name><provider_url><![CDATA[https://hcsblogdotorg.wordpress.com]]></provider_url><author_name><![CDATA[The Tactical Hermit]]></author_name><author_url><![CDATA[https://hcsblogdotorg.wordpress.com/author/thetacticalhermit/]]></author_url><title><![CDATA[Surveillance State: Understanding the&nbsp;Stingray]]></title><type><![CDATA[link]]></type><html><![CDATA[<h1 class="article-header__title t_article-title" style="text-align:center;"><img data-attachment-id="18863" data-permalink="https://hcsblogdotorg.wordpress.com/2016/08/27/surveillance-state-understanding-the-stingray/sr/" data-orig-file="https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png" data-orig-size="1200,712" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="SR" data-image-description="" data-medium-file="https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=300" data-large-file="https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=1024" class="aligncenter wp-image-18863 size-large" src="https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=1024&#038;h=608" alt="SR" srcset="https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=1024&amp;h=608 1024w, https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=150&amp;h=89 150w, https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=300&amp;h=178 300w, https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?w=768&amp;h=456 768w, https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px"   /></h1>
<h1 class="article-header__title t_article-title" style="text-align:center;"><strong><a href="http://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/">What Is the Big Secret Surrounding Stingray Surveillance?</a></strong></h1>
<h1 style="text-align:center;"><strong><a href="http://arstechnica.com/tech-policy/2016/08/to-find-suspect-city-cops-ran-stingray-for-hours-then-called-in-fbi/">FBI’s stingray quickly found suspect after local cops’ device couldn’t</a></strong></h1>
<h1 style="text-align:center;"><strong><a href="https://www.theguardian.com/us-news/2016/aug/26/stingray-oakland-police-fbi-surveillance">Stingray documents offer rare insight into police and FBI surveillance</a></strong></h1>
<p style="text-align:center;">(click on each individual title link above to be re-directed to source page)</p>
<p>&nbsp;</p>
<p>Here are three articles I found that you guys need to read to understand how this technology is being used, and at times, abused by Law Enforcement.</p>
<p>&nbsp;</p>
<p>Stay Alert, Stay Armed and Stay Dangerous!</p>
]]></html><thumbnail_url><![CDATA[https://hcsblogdotorg.files.wordpress.com/2016/08/sr.png?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[440]]></thumbnail_width><thumbnail_height><![CDATA[261]]></thumbnail_height></oembed>