informationliberation
The news you're not supposed to know...




An Introduction to Austrian Economics: Understand Economics, Understand Everything
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Jul 12 2010, 6:15 PM Category: Big Brother/Orwellian Source: Activist Post Print

10 Ways We Are Being Tracked, Traced, and Databased

Are technological advances infringing on our right to privacy?

The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry - which now seems to be becoming a war on "liberty and privacy." Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot. High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:
  • Internet -- Internet browsers are recording your every move forming detailed cookies on your activities. The NSA has been exposed as having cookies on their site that don't expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide NO privacy to users, while technologies for real-time social network monitoring are already being used. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple's iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cybersurveillance by citizens.
  • RFID -- Forget your credit cards which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your SSN. Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more. RFID "proximity cards" take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access. Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless -- perhaps including tracking hard currency so we can't even keep cash undetected. (Also see microchips below).
  • Computer cameras and microphones -- The fact that laptops -- contributed by taxpayers -- spied on public school children (at home) is outrageous. Years ago Google began officially to use computer "audio fingerprinting" for advertising uses. They have admitted to working with the NSA, the premier surveillance network in the world. Private communications companies already have been exposed routing communications to the NSA. Now, keyword tools -- typed and spoken -- link to the global security matrix.
  • Public sound surveillance -- This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous "keywords." This technology has been launched in Europe to "monitor conversations" to detect "verbal aggression" in public places. Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.
  • Biometrics -- The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and Government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in National identification cards.
  • Microchips -- Microsoft's HealthVault and VeriMed partnership is to create RFID implantable microchips. Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future. The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.
  • Facial recognition -- Anonymity in public is over. Admittedly used at Obama's campaign events, sporting events, and most recently at the G8/G20 protests in Canada. This technology is also harvesting data from Facebook images and surely will be tied into the street "traffic" cameras.
All of this is leading to Predictive Behavior Technology -- It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling. It's been marketed for such uses as blocking hackers. Things seem to have advanced to a point where a truly scientific Orwellian world is at hand. It is estimated that computers know to a 93% accuracy where you will be, before you make your first move. Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.

Many of us are asking: What would someone do with all of this information to keep us tracked, traced, and databased? It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.
__
Activist Post is an Independent News blog for Activists challenging the error of establishment.





Latest Big Brother/Orwellian
- The Worst Trolls On The Internet Are The Government Trolls
- Feds Ignore First Amendment, Supreme Court Precedent In Seizing Domain Of Social Network For Sex Workers
- US Supreme Court Rules Cops Need Warrants to Search Cell Phones
- State Legislators Discussing Laws That Will Put Law Enforcement Surveillance Cameras Inside Private Businesses
- Obama Admin Seeks Authority To Ruin All GPS Navigation Systems
- Judge Says NSA Can Continue To Destroy Evidence
- The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible
- Victory for Involuntary Servitude in Colorado









Comments 1 - 3 of 3 Add Comment Page 1 of 1
Anonymous

Posted: Jul 12 2010, 10:01 PM

Link
7581 There are ways to stop this. Personally, some things are near unavoidable. I have a student ID, a debit card, a CVS card and more. Luckily, I use Linux for my computer and hope to switch to open-source browsers - harder to track. I'm a little screwed on my DNA, but a lot of people are.

Chris

Posted: Jul 12 2010, 10:04 PM

Link
And use Scroogle.org ( https://ssl.scroogle.org ) instead of Google.
Anonymous

Posted: Feb 22 2012, 11:16 AM

Link
189221 I have seen how they are doing it
our homes wiring are being use as monitoring , all the electrical wires at home transfer video to the centers and the light bulbs some how are the cameras , and they can cach our thoughts
they know when something is against them , or something they dont like they make you have little accidents , lr the manipulate situation to keep you in your statuscuo , they cant come to your houses , but they are always in the shadow watching , and if they know you know they make you feel crazy you cant say anything because every body laughts


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

SWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong Home - 07/25Man Goes to Jail for Public Intoxication, Comes Out Looking Like He Went Through a Meat Grinder - 07/29The Absurd, Bureaucratic Hell That Is the American Police State - 07/29Man Asks Cop For Help To Find Missing Girlfriend, Cop Beats Him With A Baton - 07/29Iowa Cop Accidentally Discharges Gun after Pursuing Man Experiencing Medical Condition - 07/30Mass Incarceration: 21 Amazing Facts About America's Obsession With Prison - 07/29Houston Cop Forces Family to Leave Blind Chihuahua at Roadside to Die in Traffic Stop - 07/30The Drug War, the Fourth Amendment, and Anal Cavity Searches in New Mexico - 07/30

Rialto, CA Police Made to Wear Cameras, Use of Force Drops by Over Two-ThirdsCop Who Karate Chopped NY Judge In Throat Gets Off Scot-FreeFlorida Cop Smashes Compliant Woman's Face Into Car -- "Maybe Now You Can Understand Simple Instructions"VIDEO: Lapel Cam Reveals A Day In The Life Of A U.S. Police Officer (Tasing, Beating, Breaking & Entering, Stomping On Heads... and Laughing About It)Caught On Tape: Officer Sucker Punches Inmate In Face, Files Report Claiming 'Self Defense'Insult Person On Twitter, Go To JailSWAT Team Brings TV Crew To Film Raid Against Threatening Internet Critic -- Raids Innocent Grandma InsteadCop Karate Chops NY Judge In The Throat
(more)

 
Top