Monday, July 7, 2025

Polaris of Enlightenment

The Swedish government launches AI inquiry

Published 26 September 2024
– By Editorial Staff
1 minute read

The Swedish government has decided to review legislation on the use of AI in Sweden to ensure that Swedish rules are in line with the new EU AI Regulation.

The new EU AI Regulation, which came into effect on 1 August this year, will create a common set of rules for the development and use of AI systems in the EU. It aims to ensure a high level of safety, health and protection of fundamental rights for all EU citizens.

The government has now decided to set up an inquiry to examine “the need for national adjustments” in Swedish laws to bring them into line with the regulation.

– We are in the midst of a technological change where AI has great potential to change the way we work in many sectors and in many parts of society. With this inquiry, we are taking an important step to ensure that AI is used in a way that is safe, reliable and in line with our fundamental values, said Minister for Civil Affairs Erik Slottner in a press release.

The inquiry will propose any necessary legislative changes, as well as measures for transparency and control. Helena Rosén Andersson has been appointed as the investigator and will report no later than 30 September 2025.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Buying someone’s real-time location is shockingly cheap

You need to stop handing out your cell number. Seriously.

Published 5 July 2025
– By Naomi Brockwell
11 minute read

Most people have no idea how exposed they are.

Your location is one of the most sensitive pieces of personal information, and yet it’s astonishingly easy to access. For just a few dollars, someone can track your real-time location without ever needing to hack your phone.

This isn’t science fiction or a rare edge case. It’s a thriving industry.

Telecom providers themselves have a long and disturbing history of selling customer location data to data brokers, who then resell it with little oversight.

In 2018, The New York Times exposed how major U.S. carriers, including AT&T, Verizon, T-Mobile, and Sprint, were selling access to phone location data. This data was ultimately accessed by bounty hunters and law enforcement, without user consent or a warrant.

A 2019 investigation by Vice showed that you could buy the real-time location of nearly any phone in the U.S. for about $300.

Other vendors advertise this service for as little as $5 on underground forums and encrypted messaging channels. No need to compromise someone’s device, just give them a phone number.

The big takeaway from this article is that if someone has your number, they can get your location. We’re going to go over how to shut this tracking method down.

Whether you’re an activist, journalist, or just someone who values your right to privacy, this newsletter series is designed to give you the tools to disappear from unwanted tracking, one layer at a time.

How cell numbers leak location

Your cell number is a real-time tracking beacon. Every time your phone is powered on, it talks to nearby cell towers. This happens even if you’re not making a call.

Your phone’s location is continuously updated in a database called the Home Location Register (HLR), which lets your carrier know which tower to route calls and texts through. If someone has access to your number, they can locate you, sometimes within meters, in real time. Here are some ways they can do it:

1. Access to telecom infrastructure

Selling data / corrupting employees:

Telecom providers are notorious for selling customers’ location data directly from their HLR. Alternatively, unauthorized individuals or entities can illegally access this data by bribing or corrupting telecom employees who have direct access to the HLR.

The data retrieved from the HLR database reveals only which specific cell tower your phone is currently registered to, and typically identifies your approximate location within tens or hundreds of meters, depending on tower density in the area.

To pinpoint your exact location with greater precision, down to just a few meters, requires additional specialized methods, such as carrier-based triangulation. Triangulation involves actively measuring your phone’s signal strength or timing from multiple cell towers simultaneously. Such detailed, real-time triangulation is typically restricted to telecom companies and authorized law enforcement agencies. However, these advanced methods can also be misused if telecom personnel or authorized entities are compromised through bribery or corruption.

Exploiting the SS7 protocol (telecom network vulnerabilities):

Attackers can also exploit vulnerabilities such as those in SS7, a global telecom signaling protocol, to illicitly request your current cell tower location from the HLR database. SS7 itself doesn’t store any location data — it provides the means to query your carrier’s HLR and retrieve your current tower association.

2. IMSI catchers (“Stingrays”): Your phone directly reveals its location

IMSI catchers (often called “Stingrays”) are specialized surveillance devices acting as fake cell towers. Your phone constantly searches for the strongest available cell signal, automatically connecting to these fake towers if their signals appear stronger than legitimate ones.

In this method, instead of querying telecom databases, your phone directly reveals its own location to whoever is operating the fake cell tower, as soon as the phone connects. Operators of IMSI catchers measure signal strength between your phone and their device, enabling precise location tracking, often accurate within a few meters.

While IMSI catchers were initially developed and primarily used by law enforcement and intelligence agencies, the legality of their use (even by authorities) is subject to ongoing debate. Unauthorized versions of IMSI catchers have also become increasingly available on black and gray markets.

The solution? Move to VoIP

Cell numbers use your phone’s baseband processor to communicate directly with cell towers over the cellular network, continuously updating your physical location in telecom databases.

VoIP numbers (Voice over Internet Protocol), on the other hand, transmit calls and texts through the internet using data connections. They don’t keep HLR records, and so they’re immune to tower-based location tracking.

Instead, the call or message is routed through internet infrastructure and only connects to the cellular network at carrier-level switching stations, removing the direct tower-based tracking of your physical location.

So the takeaway is that you want to stop using cell numbers, and start using VoIP number instead, so that anyone who knows your number isn’t able to use it to track your location.

But there’s a catch: VoIP is heavily regulated. In most countries, quality VoIP options are scarce, and short code SMS support is unreliable. In the US, though, there are good tools.

Action items:

1. Get a VoIP provider

Two good apps that you can download where you can generate VoIP numbers in the U.S. are:

  • MySudo: Great for compartmentalizing identity. Up to 9 identities/numbers per account.
  • Cloaked.com: Great for burner/throwaway numbers.

We are not sponsored by or affiliated with any of the companies mentioned here, they’re just tools I use and like. If you have services that you like and recommend, please let others know in the comments!

Setting up MySudo

Step 1: Install the app

  • You will need a phone with the Google Play Store or the Apple App Store.
  • Search for MySudo, download and install it, or visit the store directly via their webpage.

Step 2: Purchase a plan

  • $15/month gets you up to 9 Sudo profiles, each with its own number. Or you can start with just 1 number for $2/month. You will purchase this plan inside the app store on your phone.

Step 3: Set up your first Sudo profile

When prompted, create your first Sudo profile. Think of this as a separate, compartmentalized identity within MySudo, distinct from your main user account.

Each Sudo profile can include:

  • A dedicated phone number
  • Optional extras like an email alias, username handle, virtual credit card, etc.

For now, we’re focusing only on phone numbers:

  • Choose a purpose for this profile (such as Shopping, Medical, Work). This purpose will appear as a heading in your list of Sudos.
  • Create a name for your Sudo profile (I usually match this to the chosen purpose).

Step 4: Add a phone number to your Sudo

  • Tap the Sudo icon in the top-left corner.
  • Select the Sudo profile you just created.
  • Tap “Add a Phone Number.”
  • Select your preferred country, then enter a city name or area code.
  • Pick a number from the available options, then tap “Choose Number.”

You’re now set up and ready to use your VoIP number!

Step 4: Compartmentalize

You don’t need to assign all 9 numbers right away. But here are helpful categories you might consider:

  • Friends and family
  • Work
  • Government
  • Medical
  • Banking
  • Purchases
  • Anonymous purchases
  • High-risk anonymous use
  • Catch-all / disposable

Incoming calls go through the MySudo app, not your default dialer. Same with SMS. The person on the other end doesn’t know it’s VoIP.

Short codes don’t always work

Short codes (such as verification codes sent by banks or apps) use a special messaging protocol that’s different from regular SMS texts. Many VoIP providers don’t consistently support short codes, because this capability depends entirely on the underlying upstream provider (the entity that originally provisioned these numbers) not on the VoIP reseller you purchased from.

If you encounter problems receiving short codes, here are ways around the issue:

  • Use the “Call Me” option:
    Many services offer an alternative verification method: a phone call delivering the verification code verbally. VoIP numbers handle these incoming verification calls without any issue.
  • Try another VoIP provider (temporary):
    If a service blocks your primary VoIP number and insists on a real cellular number, you can borrow a non‑VoIP SIM verification service like SMSPool.net. They provide actual cell‑based phone numbers via the internet, but note: these are intended for temporary or burner use only. Don’t rely on rented numbers from these services for important or long-term accounts, always use stable, long-term numbers for critical purposes.
  • Register using a real cell number and port it to VoIP:
    For critical accounts, another option is to use a prepaid SIM card temporarily to register your account, then immediately port that number to a VoIP provider (such as MySudo or Google Voice). Many services only check whether a number is cellular or VoIP during initial account registration, and don’t recheck later.
  • Maintain a separate SIM just for critical 2FA:
    If you find that after porting, you still can’t reliably receive certain verification codes (particularly short codes), you might need to maintain a separate, dedicated SIM and cellular number exclusively for receiving critical two-factor authentication (2FA) codes. Do not share this dedicated SIM number with everyone, and do not use it for regular communications.

Important caveat for high-risk users:

Any SIM cards placed into the same phone are linked together by the telecom carrie, which is important information for high-risk threat models. When you insert a SIM card into your device, the SIM itself will independently send special messages called “proactive SIM messages” to your carrier. These proactive messages:

  • Completely bypass your phone’s operating system (OS), making them invisible and undetectable from user-level software.
  • Contain device-specific identifiers such as the IMEI or IMEISV of your phone and also usually include the IMEI of previous devices in which the SIM was inserted.

If your threat model is particularly high-risk and requires total compartmentalization between identities or numbers, always use separate physical devices for each compartmentalized identity. Most people don’t need to take such extreme precautions, as this generally falls outside their threat model.

Cloaked.com for burner numbers

  • Offers unlimited, disposable phone numbers.
  • Great for one-off verifications, restaurants, or merchants.
  • Doesn’t require installing an app, you can just use it in the browser and never link any forwarding number.
  • Be aware that if any of the VoIP numbers you generated inside Cloaked hasn’t received any calls or messages for 60 days, it enters a watch period. After an additional 60 days without receiving calls or messages (120 days total of inactivity), you lose the number, and it returns to the available pool for someone else to use. Only use Cloaked for numbers you expect to actively receive calls or messages on, or for temporary use where losing the number isn’t an issue.

What to do with your current cell number

Your cell number is already everywhere: breached databases, government forms, medical records, and countless other places. You can’t “un-breach” it, and you don’t want to lose that number because it’s probably an important number that people know they can contact you on. But you can stop it from being used to track you.

Solution: Port your existing cell number to a VoIP Provider

Best choice: Google Voice (recommended due to strong security protections)

  • You can choose to just pay a one-time $20 fee, which turns the number into a receiving-only number. You’ll get to receive calls and texts forever on this number with no ongoing fees.
  • Or you can choose to pay an ongoing monthly fee, which will allow you to continue to make outgoing calls and send outgoing messages from the number.

The one-time fee option will be sufficient for most people, because the aim is to gradually make this existing number obsolete and move people over to your new VoIP numbers.

Google Voice is considered a strong option because the threat of SIM swapping (where an attacker fraudulently takes control of your phone number) is very real and dangerous. Unlike basically every other telecom provider, Google lets you secure your account with a hardware security key, making it significantly harder for attackers to port your number away from your control.

Google obviously is not a privacy-respecting company, but remember, your existing cell number isn’t at all private anyway. The idea is to eventually stop using this number completely, while still retaining control of it.

How to port your existing cell number to Google Voice

  1. Check porting eligibility
    Visit the Google Voice porting tool and enter your number to verify it’s eligible.
  2. Start the port-in process
    • Navigate to Settings → Phones tab → Change / Port.
    • Select “I want to use my mobile number” and follow the on-screen prompts
  3. Pay the one-time fee
    A $20 fee is required to port your number into Google Voice
  4. Complete the porting process
    • Enter your carrier account details and submit the request. Porting generally completes within 24–48 hours, though it can take longer in some cases.
  5. Post-port setup
    • Porting your number to Google Voice cancels your old cellular service. You’ll need a new SIM or plan for regular mobile connectivity, but you’ll ideally only use this new SIM for data, and use your VoIP numbers for communication not the associated cell number.
    • Configure call forwarding, voicemail transcription, and text forwarding to email from the Google Voice Settings page.

Now, even if someone tries to look you up via your old number, they can’t get your real-time location. It’s no longer tied to a SIM that is logging your location in HLRs.

Summary: Take it one step at a time

Switching to VoIP numbers is a big change, so take it step by step:

  1. Download your VoIP apps of choice (like MySudo) and set up your new numbers.
  2. Gradually migrate your contacts to your new VoIP numbers.
  3. Use burner numbers (via Cloaked or similar services) for reservations, merchants, or anyone who doesn’t genuinely need your permanent number.

Keep your existing SIM active for now, until you’re comfortable and confident using the new VoIP system.

When ready, finalize your migration:

  1. Port your original cell number to Google Voice.
  2. Get a new SIM card with a fresh number, but don’t use this new number for calls, texts, or identification.
  3. Use the new SIM solely for data connectivity.

This completes your migration, significantly enhancing your privacy and reducing your exposure to location tracking.

GrapheneOS users

You can’t currently purchase your MySudo subscription directly on a GrapheneOS device. Instead, you’ll first need to buy your MySudo plan through the Google Play Store or Apple App Store using another device.

Once you’ve purchased your plan, you can migrate your account to your GrapheneOS phone:

  1. On your GrapheneOS device, download and install MySudo from your preferred app store (I personally like the Aurora store as a front-end for the Google Play Store).
  2. Open MySudo on your GrapheneOS device and navigate to:
    Settings → Backup & Import/Export → Import from Another Device
  3. Follow the on-screen prompts to securely migrate your entire account over to your GrapheneOS phone.

You can retain your original device as a secure backup for messages and account data.

To ensure reliable, real-time notifications for calls and messages, make sure sandboxed Google Play is enabled on the GrapheneOS profile where you’re using MySudo.

What you’ve achieved

You now have:

  • Up to 9 persistent, compartmentalized VoIP numbers via MySudo.
  • Disposable, on-demand burner numbers via Cloaked.
  • Your original cell number safely ported to Google Voice and secured with a hardware security key.
  • A clear plan for transitioning away from your original cell number.

You’ve replaced a vulnerable, easily trackable cell identifier. Your real-time location is no longer constantly broadcast through cell towers via a number that is identified as belonging to you, your digital identities are better compartmentalized, and you’re significantly harder to track or exploit.

This marks the beginning of a safer digital future. What’s next? More layers, better privacy tools, and greater freedom. Remember, privacy isn’t a destination, it’s a lifestyle. You’re now firmly on that path.

 

Yours in Privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Fewer shootings in Sweden — but bomb attacks have doubled

organized crime

Published 3 July 2025
– By Editorial Staff
According to Swedish police, the purpose of the bomb attacks is often to extort, intimidate, or threaten the victims.
2 minute read

The number of shootings in Sweden has almost halved compared to last year – but at the same time, bombings have increased dramatically. According to new statistics from the Swedish Police Authority, over 100 bombing incidents have occurred so far this year, representing a doubling compared to the same period in 2024.

During the first six months of this year, police have recorded 84 shootings. This marks a significant decrease compared to the first half of 2022, when 205 shootings occurred, resulting in 34 deaths and 49 injuries. The number of people injured in shooting incidents has also gradually decreased since then. However, the 2025 statistics include the school attack in Örebro, central Sweden, where ten people lost their lives.

This development comes against the backdrop of Sweden’s long-standing struggles with organized crime, where violent gangs, often with immigrant backgrounds, have spread fear in both major cities and smaller towns. For several years, authorities have struggled to effectively address the escalating violence – but according to police, certain measures are now showing results.

– In both physical and digital environments, as well as in investigations, we are now faster and more efficient, which has enabled us to prevent impending crimes and increase the clearance rate of deadly gang-related violence from about 20-30 percent to about 60 percent in recent years. This partly explains why we’re seeing fewer shootings, says August Knutsson, operational coordinator at the Swedish Police’s National Operations Center.

More bombings during winter months

While shootings have decreased, another form of violence has increased significantly. So far this year, 104 explosions have occurred – double the number compared to the same period in 2024, when 52 bomb attacks were recorded.

– This is obviously serious, and we’ve noticed that criminal groups have shifted their methods and carried out more bombings during winter and spring. Often for extortion purposes, to intimidate or threaten. However, since the beginning of the year, when we saw a sharp increase in completed bombings, they have decreased. We’re arresting more perpetrators during the preparation stage than before, explains Knutsson.

He emphasizes that the situation is still considered very serious and that gang violence could soon escalate again:

– At the same time, the conflict level remains high, and we know from experience that the situation can change rapidly. We’re doing everything we can to keep violence levels down.

“Floating Pentagon” makes its presence known in Stockholm

Sweden-NATO-relationship

Published 3 July 2025
– By Editorial Staff
The USS Mount Whitney has a crew of approximately 500 personnel and is normally based in Naples, Italy.
2 minute read

The US command ship USS Mount Whitney, often referred to as a “floating Pentagon” due to its advanced command systems, has docked at Frihamnen port in Stockholm, Sweden.

The visit marks the conclusion of a month-long mission in the Baltic Sea where the vessel played a leading role in the extensive NATO exercise Baltops, working alongside Swedish personnel among others.

The vessel serves as the flagship of the US Sixth Fleet and is designed to command complex and extensive military operations. At 200 meters in length, it is equipped with advanced communication and command systems that make it a hub for US naval operations.

– We usually call it a floating Pentagon because our main strength lies in communication and command systems, says Jonathan Desimone, Command Systems Officer aboard, to Swedish public broadcaster SVT.

During the recently concluded Baltops, an annual NATO-led exercise in the Baltic Sea, USS Mount Whitney played a key role. The Swedish Navy participated with a submarine, among other assets, and several Swedish liaison officers were aboard as part of the NATO staffing.

– We had several Swedish liaison officers aboard throughout the exercise as part of the NATO staffing, says Commander and Captain Colin Price.

– We are here to participate in Baltops 2025 and to demonstrate US presence. Our goal as a naval force is freedom of navigation and regional stability, he further states.

No plans to leave Europe

Price emphasizes the value of the exercise and multinational NATO cooperation – but critics suggest the ship’s visible presence in Stockholm could also be interpreted as a show of force directed at Russia, rather than a purely diplomatic visit.

Meanwhile, the Baltic Sea has been characterized by increased military activity, with both NATO and Russia conducting parallel exercises. During Baltops, Russian fighter aircraft were observed flying near USS Mount Whitney in international airspace.

– I wouldn’t call them incidents, but yes, we had interactions with aircraft flying near Mount Whitney, Price comments and explains:

– During Baltops, we’re in the middle of the Baltic Sea and it’s international airspace where aircraft can fly wherever they want.

During Donald Trump’s presidency, there have been reports and signals suggesting that the US plans to significantly reduce its military presence in Europe. However, according to the commander, there are no such plans for USS Mount Whitney.

Swedish mother on the population crisis: “Children are seen as troublesome”

Published 3 July 2025
– By Editorial Staff
Having small children rarely allows for uninterrupted scrolling through social media.
3 minute read

An unprecedented low number of children are being born in Sweden, and the reasons are said to be numerous – from war, climate alarmism, and economic anxiety to fear of childbirth.

Mother of four Anna Björklund argues that rapid digitalization and increased screen time have had a major impact and describes how children today are often perceived as an annoying disturbance that many would rather avoid.

The Swedish government recently announced the formation of an expert group to investigate why birth rates are declining and whether this trend can be reversed. The work is based on a similar study recently conducted in Finland.

One of the group’s members is mother of four, podcaster, and author Anna Björklund, and on Swedish public television SVT, she highlights digitalization as a possible key factor.

– Personally, I believe one piece of the puzzle is that we who are having children now, or should be having children now, are the first generation that grew up with the internet.

“Demanding presence”

Björklund is uncertain whether the trend can be reversed but sees possibilities to influence the development. She describes how children today are often perceived as demanding – not necessarily because of the children themselves, but because adults are not present.

– I’ve noticed that people see children as very annoying. That they talk about children as very troublesome, and when I tell people I have many children, they say it sounds exhausting. What they mean is that children demand presence in the room, and if you don’t respond to the subtle animal-like signals from a baby, it will scream.

– When parents have so many things competing for their attention and causing them not to be present in the room, children are perceived as very difficult. Then the question is, should the children be removed, or should humans as a species learn again to be present in the room? Personally, I think perhaps the latter, she says.

Constant browsing on smartphones has made us less present in the moment. Photo: Tim Mossholder/Unsplash

In Finland, where birth rates have also fallen to record low levels, a government study has recently analyzed the causes of declining childbirth. Anna Rotkirch, research professor and director of the Population Research Institute in Finland, particularly points to the difficulty of finding the right partner on public television.

– This is a new trend, young adults’ relationships don’t last nearly as long as they did for previous generations, she explains.

Rotkirch also emphasizes digitalization as a possible explanation for the changing relationships.

– It’s difficult to see anything else that would have changed globally over the past 15 years when we see this unexpectedly strong decline in fertility.

“Deteriorates young women’s mental health”

The population researcher emphasizes that more research is needed to understand the full impact of digitalization on birth rates. But there are already clear signs that screen time and social media have negative effects – particularly on young women’s mental health.

– We know that social media in particular has deteriorated young women’s mental health, and we know that mental health problems and loneliness make it much harder to find a partner and start a family, she says and adds:

– It also affects the quality of relationships. We know that screen time itself, regardless of what you do on the device, makes you less satisfied with your relationship and increases the risk of divorce.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.