Home / Privacy / EXCLUSIVE: Documents Reveal Seattle’s Secretive DHS Funded ‘Mesh Network’

EXCLUSIVE: Documents Reveal Seattle’s Secretive DHS Funded ‘Mesh Network’

UPDATE: New Mesh Network Documents Confirm Police Vehicle’s Real-Time Access To DHS Spy Cameras

Seattle residents have begun questioning the installment of several mesh network nodes attached to utility poles in the downtown area which were purchased by the Seattle Police Department last February using cash from a $2.7 million Department of Homeland Security grant.

GardlandLongGridThe wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions.

Labeled by their intersection location such as “1st&University” and “2nd& Seneca,” the multiple network devices are easily detected in Seattle’s downtown area through a simple Wi-Fi enabled device – leading many residents to wonder if they are being detected in return.

“How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?” asked Seattle newspaper The Stranger.

According to reports from Kiro 7 News, the mesh network nodes can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.

So far Seattle police have been tight-lipped about the network’s roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement.

According to The Stranger’s investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance, unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy.

Exclusively revealed by Storyleak, diagrams attached to a March 2012 proposal request (# DIT-2996), which have since been approved, updated and finalized, show the mesh network’s full capabilities.

On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project, a diagram details the system’s basic communication abilities in regards to the Port of Seattle.


Several connections can be made by studying the diagram, including its now apparent link to Seattle’s public waterfront. The recent instillation of 30 Department of Homeland Security-funded surveillance cameras on Seattle’s popular waterfront, complete with mesh network nodes attached, were purported to increase the Port of Seattle’s protection against acts as terrorism. Residents soon discovered multiple cameras facing inward toward Seattle homes, not towards the coast line as allegedly intended. The “accident” was later remedied by city officials.

Multiple law enforcement agencies will have access to the mesh network, including the Seattle Fusion Center, where FBI and Homeland Security gather data on Americans deemed “extremist” for such crimes as “loving liberty.” Incredibly, even the U.S. Senate called Fusion Centers a “useless and costly effort that tramples on civil liberties” in a 2012 bi-partisan report.

Page 65 of the public document breaks down the information-collecting capabilities of the Mesh Network Mesh System (NMS), revealing its ability to collect identifying data of anyone “accessing the network.” Although the document details an alert system for reporting unauthorized access, a public user guide from a similar Aruba software program mentions a feature which collects “a wealth of information about unassociated devices,” validating fears of local residents who walk through the mesh network’s perimeter.

“The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”

The bottom left of the diagram shows what may be the Seattle Department of Transportation Intelligent Transportation Systems Network, linked directly into the mesh network. According to the Department of Transportation website, the system controls several surveillance related items such as license plate readers and closed circuit TV (CCTV) systems.

According to statements made by Seattle’s Assistant Chief Paul McDonagh last February regarding the waterfront cameras specifically, “only a few people would have that capability, so the officer on the street would just have the ability to view it.”

In light of Seattle and other cities’ secret participation in TrapWire, a sophisticated facial recognition program ran through city CCTV cameras, further surveillance abuses will likely continue as the mesh network integrates to become a more streamlined and powerful tool.

In reality, Seattle is only one of countless cities across the country being flooded with a sea of surveillance equipment. While the public has focused mainly on surveillance issues relating to the NSA, the federal government has continued its 20-plus year dragnet surveillance grid roll out of covert conversation-recording microphones.

As recently reported by Storyleak, multiple cities including Las Vegas have begun using “Intellistreets” light fixtures capable of recording conversations. The device has received increased scrutiny since 2011 when their “Homeland Security” application, which shouts government messages from a loudspeaker system, was widely revealed to the public.

Other audio recording devices like the ShotSpotter microphones, allegedly used to analyze the location of gun shots, have been found to record conversations of unsuspecting city residents as well.

Earlier this year, Seattle police joined the growing number of departments using PREDPOL “predictive policing” software, a program that uses advanced mathematical algorithms and crime data to predict where crimes will occur down to a 500-square-foot area. Civil liberties advocates fear the program will begin being used on directly on individuals, although police deny the claim.

Despite the federal government’s constant justification of throwing away civil liberties in the name of fighting terrorism, which kills less Americans than bee stings, continued NSA revelations show that the federal government’s surveillance system build-up is aimed at everyday Americans, not foreign Al Qaeda admittedly supported by the U.S. government in Syria.

Full PDF Available Here


“Port Security Video Surveillance System with Wireless Mesh Network” –

Share Button

About Mikael Thalen

Mikael is the lead features writer at Storyleak.com. His articles have been featured on sites such as the Drudge Report, Infowars and Natural News. During his time at Examiner.com, he was frequently ranked the number one political writer.

Check Also


Photos: Concert Venues Now Search Inside Your Pants

Even at the lowest levels within the bureaucracy-based establishment system, we are all systematically targeted as terrorists -- and the reach is growing further.


  1. Listening to Jones today, he made a great point. These devices can be used to shutdown all cell phones during a time of protest, false flag operation, or police brutality. It will be much harder video tape injustices. Just like what happened during Boston.

    Can't wait to see the PDF Anthony and Mikael are dissecting…

  2. You guys are stroking yourselves. MAC address and IP address are not unique to the user. Neither can the individual be tracked. Can you guys stop destroy journalism? You guys are the ones destroying America with your fear propaganda.

    Search: Rand Paul Blue Cross
    Search: Alex Jones Chase Bank Hoax Y2K Hoax
    Search: Alex Jones Hijacks Alamo Rally
    Search: Ron Paul Gold Standard China Takeover

    These are real news stories… Sorry, but Alex is using this Anthony Gucci kid. You all are better running away from him as fast as possible.

    • See the definition of an IP address.

      An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer, phone) participating in a computer network that uses the Internet Protocol for communication.[1]

      Note how IP addresses are assigned to devices…that IP address may not have the user name, but that device IS registered to a specific user, put two and two together.

      • IP addresses can change depending on your network, many times they are dynamic. So he is right in that they are not specific to a user, however, every registered IP address comes from a device with a MAC address, which IS specific to the user and he is retarded for implying that it is not. The only way a device MAC address changes is if you hack it, the people concerned about their privacy are not hackers.

    • "Is the world stage being set up for something big by the NSA data-minig … as in real BIG?!"

    • One could assume that DHS would have access to the GSM/LTE towers.

      That means even having phone reception gives your phone an IP address.

      Also I do this kind of I.T work for a living.

      The spying on your phones is only half the story. All of these white box devices are capable of WIPS. https://en.wikipedia.org/wiki/Wireless_intrusion_

      If you had a whole city covered with them, you could shut down EVERY wifi network. This is bad. In Egypt when the Government shut the internet down, hackers used dial-up modems conected to WiFi routers to give people internet access again (even if it was a bit slow!).

      This would not be possible with a mass deployment of these devices. You could not tether phones to laptops, or home routers or even the WiFi at your workplace. All under DDoS attack by these Govt probes. DHS could shut down EVERYONES WIFI .

      Peace from Australia.

    • MAC Addresses are not specific to the user? Are you smoking crack? yes they are every device has a unique registered MAC address unless you are a 1337 hacker and can edit that device information it is specific and locked in.

    • Oh and another thing, this is not fear propaganda, what they are doing to people is what is inducing the fear to begin with. This is all very real and has been proven many times, for example, how about the google vans that went around the US taking pictures for google maps and basically hacking every wifi network along the way? This was taken to court but all the collected data was just that, collected. Honestly im not afraid of it, but they are doing it, and hiding it, it is wrong.

    • You’re scary dude! You don’t like Alex Jones, which is fine. He’s a bit over the top for my taste as well. But a large percentage of his information is verifiable and on point. This story for instance can’t even get the light of day on any mainstream or midstream news outlet, and it’s GD HUGE! WHY? How bout TPP Chapter 1 of 28? Is that fear mongering too? If it’s so harmless, webby the cloak of secrecy. I think I understand your perspective as a veteran, and your desire to hold fast to an idea of America you and many of your brothers made a tremendous sacrifice for. Problem is those in power have very different motivations than the ones they portray for the camera. Alex Jones is yelling fire in a crowded theater, no doubt. But is the theater not engulfed in flames?

  3. Seems like all this surveillance is being done to keep the lid on SOMETHING !

    What could so ultra-secret and dire at the same time?

    "The BIGGEST Coverup in USA History"

    ! ! ! Something's going on — that's for sure,
    but we never get the right clues before they happen

  4. Good Job Anthony and Mikael! Great job on AJ's show today….

  5. Dwight D. Eisenhower exit speech on Jan.17,1961

    Eisenhower warns us of the military industrial complex.

  6. Hey VBN- KNOW WHAT A MAC ADDRESS IS? It's a unique hex identifier on your PC or internet access device. That means it's unique to the device. (Derp)

  7. Withdraw cash suhagra 100 cheap ty The Global Fund says that of the estimated 9 million casesof TB worldwide in 2012, only 6 million were diagnosed andtreated – leaving an estimated 3 million people with TB who wentundiagnosed, untreated or unreported.

  8. A relationship of a business nature exists between the victim and the defendant, who could be any service provider, contractor or professional, such as a physician, psychotherapist, dentist, attorney,

    real estate agent, banker, collection service, building contractor, movie producer, casting agent, executor of an estate, landlord or property manager,

    teacher or professor. If you are not working with a professional, the insurance company might offer you less

    compensation. When you are unsure of which route

    to take to get the compensation you deserve for your case individually,

    consider working alongside personal injury lawyers to help with expediting the case and

    getting you the justice you need to move forward with your life.

  9. Good Job Anthony and Mikael! Great job on AJ's show today

  10. A relationship of a business nature exists between the victim and the defendant

  11. Very wonderful and very important essay

  12. A relationship of a business nature exists between the victim and the defendant

  13. A relationship of a business nature exists between the victim and the defendant

  14. What could so ultra-secret and dire at the same time

  15. These devices can be used to shutdown all cell phones during a time of protest

  16. It will be much harder video tape injustices

  17. A relationship of a business nature exists between the victim and the defendant

  18. Good Job Anthony and Mikael! Great job on AJ's show today

  19. Seems like all this surveillance is being done to keep the lid on SOMETHING

  20. A relationship of a business nature exists between the victim and the defendant

  21. It will be much harder video tape injustices

  22. It is very important is very wonderful step

  23. It is very important is very wonderful step

  24. Great article , keep up the good work

  25. مجموعة واسعة من فلل وبيوت و فلل للبيع في انطاليا تركيا الساحلية، ذات الطبيعة الخلابة، بالتقسيط وأسعار منافسة للاستثمار، أجمل العقارات وتصميمات رائعة.

  26. I understand that this type of technology can be abused…used against anyone who the operators deem dangerous. Liberty lovers like myself do not like to be spied on. I am committing no crimes so what do I have to hide?

    Nothing, but the fact of the matter is people like me are considered dangerous by the very people that will be operating these systems. Plus we all know how bad Obamacare has operated…what kind of issues could occur with morons controlling vast amounts of personal data?

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>