BigBro page 2 ....... BB pg 3 ...... page 4 ...... page 5 ..... Privacy ...... Mobile Phone Stalking
"Fear none of those things which thou shalt suffer. "
Revelation 2:10
NWO:
SURVEILLANCE, MONITORING and CONTROL (page one)
the
eyes and ears of Big Brother --- the SYSTEM
"Beware....for
there is nothing covered, that shall not be revealed;
neither hid, that shall not be known.
Therefore whatsoever ye have spoken in darkness shall be heard in
the light;
and that which ye have spoken in the ear in closets (phones,
emails etc.)
shall be proclaimed upon the housetops" Luke 12: 1-3
A
Police State depends upon neighbors and relatives who report on
neighbors and relatives.
"Trust ye not in a friend, put ye not confidence in a guide:
keep the doors of thy mouth from her that lieth in thy bosom .
For the son dishonoreth the father, the daughter riseth up
against her mother,
the daughter-in-law against her mother-in-law;
a man's enemies are the men of his own house." Micah 7:5,6....
Matthew
10:36 "A man's foes shall be they of his own
household."
"Fear them not therefore; for there is nothing covered, that
shall not be revealed;
and hid, that shall not be known." Matthew 10:26
"For there is nothing hid, which shall not be manifested;
neither was anything kept secret, but that it should come abroad.
If any man have ears to hear, let him hear." Mark 4:22
Parental surveillance causes resentment and resistance:
Matthew 10:21and Mark 13:12; and Luke 21:16;
The Myriad
Surveillance Systems
"the
night ( and day) has 1,000 eyes" (and ears too !)
Echelon, Magic Lantern , Carnivore, Blue Tooth, QinetiQ, Galileo,
Passport, Trojan Horse, FACEit,
OPLAN etc. etc. etc.
NSA--top
spy agency
Spies on UN
The details were in a memo, leaked to the paper, written
by Frank Koza, a top official at the National Security
Agency, America's key and highly secretive
intelligence agency.
The memo has been circulated to senior NSA agents and to a
friendly foreign intelligence agency, believed to be Britain,
asking for its input.......
The NSA's surveillance operation is believed to have been
requested by President Bush's National Security Adviser, Condoleezza
Rice, and reveals the scope and intensity of spy
operation against supposedly friendly nations at the Security
Council.
Mr [Frank] Koza, the chief of staff of the
agency's regional-targets section, http://www.theage.com.au/articles/2003/03/02/1046540068572.html
See
Berit Kjos on Surveillance
http://www.crossroad.to/News/surveillance.html
Someone
wanted to know what the definition of "Big Brother"
was.
It is when government is overly invasive in your life,
under the pretext of caring for your best interests.
It is the monitoring and tracking of every movement and
conversation of an individual. It is profiling that person by
subjectively analyzing data into an arbitrary, and oftentimes
erroneous, one-sided interpretation of the facts. Unrelated bits
and pieces of information about a person are then forced into a
concocted-relationship of events and then fed into databanks that
hold one's portrait frozen and labeled, and networks that data to
anyone who can access that information.
Since that databank is all-inclusive, one can access for a
specific concern, and yet receive that person's cryptic and terse
report on his whole life.....
information that should remain private, and under the control of
that individual.
Instead ...... government, agencies and certain people in high
places have more control over an individual
than the individual has over his own life. That is called
tyranny.
Voodoo Presumption : Taking that subjective analysis and then
attempting to project the future decisions of that individual.
This is an extreme form of imagination, and highly erroneous.
This is to step in--- as a usurping god---- and determine for
another his will, intent and motives. It is grossly unlawful.
"He shall cause craft to prosper" -- Daniel 8:25
( Government
seeks to marshal, rally and employ as many people as possible in
this venture of snooping and reporting on the activities of
others.)
________________________________________
"the lesson of the 21st century is, if you give data
to governments, it keeps getting passed along to other
hands,"
the lawyer said.
http://www.canada.com/ottawa/ottawacitizen/news/story.html?id=e2491e79-afaf-4869-b5ac-2bfb2347ed13
From
the newswire: fair educational use
Big neighbor reporting on you
http://www.prisonplanet.com/cable-tv-workers-trained-to-spy-on-citizens.html
Future tracking of mileage tax
"Sara was late for work. The alarm clock didn't alarm, the
kids were unusually slow getting ready for school, and nothing
went right. She finally got to her car a brand new 2020 Chevy
Adventure. She touched the finger-print
secured start button. Nothing. It wouldn't start. She touched it
again. Nothing. Furious, she banged the steering wheel with her
fist. Then she noticed the paper
hanging from the receipt printer
on the dash.
"Your designated visa account rejected your Road Use Tax in
the amount of $87.32 for the month of June, 2020.
You must insert a valid account card to activate your automobile."
It's
coming. With a $16 million grant from the federal government,
the University of Iowa is developing a Global Positioning
Satellite system that can measure the mileage, apply a variable
tax rate that will increase during rush hours and in high-traffic
areas, calculate the total, charge a designated account card, and
shut down your automobile if unpaid when due. Some 2,700
automobiles in five states will be used in the test.
http://www.wnd.com/index.php?fa=PAGE.view&pageId=103621
Little Bro: Citizens hacking IDs of citizens
http://www.lehighvalleylive.com/today/index.ssf/2009/07/government_officials_say_rfid.html VIDEO
https://www.google.com/hostednews/ap/article/ALeqM5hUMNI-KsIP1FEmrUcBTdlBZhcSmAD99CM02G2 Photos
http://hosted.ap.org/dynamic/stories/U/US_CHIPPING_AMERICA_IV_ABRIDGED?SITE=NYBUE&SECTION=HOME&TEMPLATE=DEFAULT
Secret rooms at NSA shielding the government
http://www.wired.com/threatlevel/2009/07/einstein/
Courtroom evidence: Your cell phone will be used against you
http://www.nytimes.com/2009/07/06/nyregion/06cellphone.html?_r=1&pagewanted=print
DARPA's Cyberspace control ( NSA )
http://www.marketoracle.co.uk/Article11731.html
Big Brother Technologies
http://www.telegraph.co.uk/scienceandtechnology/technology/5719599/Big-brother-is-watching-The-technologies-that-keep-track-of-you.html
Environmental and Security monitoring --tracking food ... Ed:
overseen by the false prophet ??
"Part of the agreement centred on the need to push Global
Monitoring for Environment and Security (GMES) from
the research stage into the operational stage. The technology has
been developed to help monitor phenomena such as natural
disasters or the mapping of international shipping lanes and harvest distributions. [Ed: food tracking ]
The Earth [ Ed: GMES]
observation system will use airborne satellites and a
system of sensors
on the ground and in the sea to record data.
http://euobserver.com/9/28215/?rk=1
Answer Government PERSONAL questions or be fined $5,000.00
http://www.worldnetdaily.com/index.php?fa=PAGE.view&pageId=99337
Pentagon want "Cyber command "
"WASHINGTON (Reuters) - The Pentagon plans
to create a new military command for cyberspace, stepping up
preparations by the armed forces to conduct both offensive and
defensive computer warfare, the New York Times said on Friday."
http://www.reuters.com/article/politicsNews/idUSTRE54S0XQ20090529
EU wants 'Internet G12' to govern cyberspace
The European Commission wants the US to dissolve all
government links with the body that 'governs' the internet,
replacing it with an international forum for discussing internet
governance and online security.The rules and decisions on key
internet governance issues, such as the creation of top level
domains
(such as .com and .eu) and managing the internet address system
that ensures computers can connect to each other, are currently
made by the Internet Corporation for Assigned Names and Numbers (ICANN),
a private, not-for profit corporation based in California which
operates under an agreement with the US Department of
Commerce.Commissioner Reding wants internet governance
fully privatised but overseen by an international forum
.The decisions made by ICANN affect the way the internet works
all around the world.
Instead, Brussels would prefer that an international
government forum that to meet twice a
year makes recommendations by majority vote to the
newly privatised ICANN. The forum would be restricted to
representatives from 12 countries, with a regional balance taken
into consideration.
http://euobserver.com/19/28065
Digital Converter box for TV has microphone and camera in it .
You are being listened to -- and watched-- in your own home
http://forum.prisonplanet.com/index.php?topic=87074
"By installing covert spy devices and hidden
microphones inside our all but mandatory digital boxes, the
government and whatever corporate entities get a slice of the
pie, have direct access to our living rooms. This is the ultimate
Big Brother scenario whereby the majority of Americans and
Europeans will have Orwellian telescreens watching their every
move.
Many will dismiss such claims as conspiracy fodder, but the fact
is that Americans have been spied on for decades, previously
under the Echelon program and more recently as part of the Bush
administrations warrantless wiretapping program."
http://www.fourwinds10.com/siterun_data/media/television/news.php?q=1235076242
http://kidsarocker.newsvine.com/_news/2009/02/18/2448958-hidden-spy-camera-mic-found-inside-digital-tv-box
Big SNOOP : ALL forms of communication monitored
http://www.telegraph.co.uk/news/uknews/5215413/Every-phone-call-email-or-website-visit-to-be-monitored.html
Smart Phones and surveillance ability Be careful who you
call
..." suspicious employers, parents and spouses get to
see the full text of all SMS messages sent or received,
plus a list of all calls including phone number, time and
duration.
The spyware works by transferring the information to an
Internet server as soon as it is connected, so it remains
available even if the user erases the iPhone's internal log.
The records can then be viewed on the server via a web
browser, or downloaded in CSV form for use in a local database or
spreadsheet.
According to vendor Retina-X Studios, "Mobile Spy runs in
total stealth mode and no mentions of the program are shown
inside the iPhone."
http://www.itwire.com/content/view/22376/1168/
" Both my new laptop and my cell phone have built-in
cameras. The cellphone also has GPS and 24/7 Internet
connectivity, so it is the perfect surveillance device."
From Yelena Slatery
With the melding of private corporations and
government, a Fascistic world order is becoming not just a
possibility but a REALITY. Not only will most of the world 's
citizens be watched in all but a few
corners of their private space but databases full of facial
recognition , fingerprints, DNA, biographical and medical
information will be stored somewhere with someone in an unseen
part of cyberspace that can be brought up within virtual seconds
without your knowledge. When the corporate
world cannot be seperated from a globally controlled government,
it's time to re-think our long term goals.
http://www.opednews.com/articles/Google-Health--Verichip--by-Greg-Nick-090417-594.html
Even more Snooping on your private personal computer
They can also use a surveillance vehicle or
neighbouring property to hack into a wireless internet
connection.
The most intrusive technique involves breaking into a property to
fit a device to a computer which logs key strokes on the keyboard
and transmits the results back to a listening station.
The Association of Chief Police Officers said remote surveillance
was regulated by the Regulation of Investigatory Powers Act
(Ripa).
MI5 and GCHQ monitor the internet through a
network of "black boxes" attached to servers but they
are looking at ways of expanding the system and want to be able
to link up more government databases to catch criminals.
http://www.fivedoves.com/letters/jan2009/donnad16.htm
Huge interconnecting Law enforcement database created --N-DEx
WASHINGTON, March 6 (UPI) -- A huge database
allowing federal, state and local law enforcement
officials in the United States access to hoards of records is in
the offing, officials said.
The National Data Exchange within the U.S.
Justice Department system hooks up millions of
criminal investigative records from thousands of law enforcement
agencies stored in data warehouses, giving investigators and
analysts a powerful tool to combat crime and seek out terrorist
plots, The Washington Post reported Thursday.
The N-DEx system
is set to phase in as early as this month [ March 2008 ] . When
operational, N-DEx, developed by Raytheon
for $85 million, will permit 200,000 state and local
investigators and federal counter-terrorism investigators to
search millions of police reports in some 15,000 state and local
agencies, with a few clicks of a computer mouse, the newspaper
account said.
http://www.upi.com/NewsTrack/Top_News/2008/03/06/huge_law_enforcement_database_created/5143/
Coplink --how it tracks --1,600 law-enforcement agencies that uses a
commercial data-mining system called Coplink.
With Coplink, police investigators can pinpoint suspects by
searching on scraps of information such as nicknames, height,
weight, color of hair and the placement of a tattoo. They can
find hidden relationships among suspects and instantly map links
among people, places and events. Searches that might have taken
weeks or months - or which might not have been attempted, because
of the amount of paper and analysis involved - now are done in
seconds.
She told the system to also search data warehouses built by
Coplink in San Diego and Orange County - which have agreements to
share with Tucson - and came up with the name of a particular
suspect, his age and a possible address. She asked the software
to find the suspect's links to other people and incidents, and
then to create a visual chart displaying the findings. Up popped
a display with the suspect at the center and cartoon-like images
of houses, buildings and people arrayed around him. A final click
on one of the houses brought up the address of an apartment and
several new names, leads she could follow.
"The power behind what we have discovered,
what we can do with Coplink, is immense," Tucson
police Chief Richard Miranda said. http://www.mercurynews.com/politics/ci_8472527
Sensors tracking us all day long; "sniffers"; rfid tag readers
http://www.princegeorgecitizen.com/index.php?option=com_content&task=view&id=114906&Itemid=590
"Protect America Act " + more = total surveillance
http://www.voanews.com/english/2008-01-25-voa47.cfm
Senate OK's immunity for utilities aiding warrantless
wiretapping
The temporary surveillance law, approved under heavy White
House pressure, gives the government broad powers to eavesdrop on
the communications of terrorism suspects without warrants. It
effectively legalized many of the practices employed by the
National Security Agency as part of a secret program approved by
Bush in late 2001.
The White House and Republican
lawmakers are pushing to make the law permanent while also adding
legal protections for telecommunications companies,
which face dozens of lawsuits. Most House Democrats and civil
liberties groups strongly oppose immunity for the communications
firms, but other Democrats - including Jay Rockefeller, chairman
of the Senate intelligence committee - back the GOP [ warrantless
wiretapping ] position.
http://www.boston.com/news/nation/washington/articles/2008/01/25/senate_oks_immunity_for_utilities_aiding_warrantless_wiretapping/
Institutionalized Spying on Americans -- Homeland Seceruity's
National Application Office -- NAO
and REAL ID Cards
by Stephen Lendman
The Department of Homeland
Security (DHS) established a new domestic spying operation in
2007 called the National Applications Office (NOA) and described
it as "the executive agent to facilitate the use of
intelligence community technological assets for civil, homeland
security and law enforcement purposes within the United
States." The office was to begin operating last fall to
"build on the long-standing work of the Civil Applications
Committee (CAC), which was created in 1974 to facilitate the use
of the capabilities of the intelligence community for civil,
non-defense uses in the United States."
http://www.globalresearch.ca/index.php?context=va&aid=7824
Aeris, GPSPursuit remote live monitoring
Aeris's network enables GPSPursuit's GPS Tracking
Units to deliver tracking and monitoring services to commercial
fleets, providing fleet managers with on-the-fly dispatching and
the ability to monitor vehicles to increase efficiency and
decrease operation costs. The GPS Tracking Units are also used as
personal tracking devices for Alzheimer's patients, children and
valuables.
http://www.telematicsjournal.com/content/newsfeed/11231.html
US Spy Satellites to monitor US citizens
The U.S.'s top intelligence official has greatly
expanded the range of federal and local
authorities who can get access to information
from the nation's vast network of spy
satellites in the U.S.
Sometime next year [2008 ] , officials will examine how the
satellites can aid federal and local
law-enforcement agencies, covering both
criminal and civil law. The department is still working on
determining how it will engage law enforcement officials and
what kind of support it will give them.
Access to the high-tech surveillance tools would, for the first
time, allow Homeland Security and law-enforcement officials to see real-time, high-resolution images and data,
Charles Allen, the DHS's [
Dept. of Homeland Security ] chief intelligence officer,
who will be in charge of the new program.
Access to the satellite surveillance will be
controlled by a new Homeland Security branch --
the National Applications Office -- which
will be up and running in October [ 2007 ]
Unlike electronic eavesdropping, which is subject
to legislative and some judicial control, this use of spy
satellites is largely uncharted territory [ Ed: not subject to limitations]
In recent years, some military experts have
questioned whether domestic use of such satellites would violate the Posse Comitatus Act. The act bars the military from engaging in
law-enforcement activity inside the U.S., and the satellites were
predominantly built for and owned by the Defense Department.
There is little if any policy, guidance or procedures
regarding the collection, exploitation and dissemination of
domestic MASINT." MASINT
" stands for
" Measurement and Signatures Intelligence " , a
particular kind of information collected by spy satellites which
would for the first time become available to civilian agencies.
According to defense experts, MASINT uses radar,
lasers, infrared, electromagnetic data and other technologies
to see through cloud cover, forest canopies and even concrete
to create images or gather data.
The spy satellites are considered by military experts to be more penetrating than civilian ones: They
not only take color, as well as black-and-white
photos, but can also use different parts of the light spectrum to
track human activities, including, for example, traces left by
chemical weapons or heat generated by people in a building.
You are
talking about enormous power," said Gregory
Nojeim, senior counsel and director of
the Project on Freedom, Security and Technology for the Center
for Democracy and Technology,
http://www.cdt.org/speech/ . . . . . . http://cdt.org/standards/
a nonprofit group advocating privacy rights in the digital age.
"Not only is the surveillance they are contemplating
intrusive and omnipresent, it's also invisible. And that's what
makes this so dangerous."
http://online.wsj.com/article/SB118714764716998275.html
CCTV to monitor / report chipped people everywhere - "Rapid Response"
Reader Paul Clarke proposed an RFID solution,
which could overcome these difficulties. Citing the current level
of integration of CCTV systems, he says: If there was a
similar initiative to link the RFID systems
used by shops to catch shoplifters, it would be
possible to search for an RFID tag that could be surgically
implanted under a childs skin or inserted into the fabric
of their clothing.
Potentially this could be an
international initiative that would mean that
if an abductor attempted to take a chipped child into a store
that subscribed to the service, store detectives would be notified and by cross-referencing with CCTV footage
one could determine the identity of the individual
[abducting a child].
Surgically implanting an RFID chip under a childs skin
seems a little Orwellian, though putting it into the fabric of
clothes seems more acceptable. Are parents likely to go to such
extremes to ensure kids are safe, or is it a step too far?
However, as reader Roger Bamford pointed out, one US firm has
already designed a human-implantable RFID chip.
VeriChip has developed a passive RFID
microchip, inserted under the skin by injection, which contains a
unique 16-digit identifier. The number on the chip which
can be read with a proprietary scanner could be used to
access medical records, or determine whether someone has the
authority to enter a secure area, the company says.
Verichip has also designed wearable
active RFID chips, designed for use within care
homes or hospital wards. The chips sound an alarm if
patients for instance, those with Alzheimers
leave a designated area. It can even lock an exit
as a patient approaches it. The chips can also be used to prevent
the abduction of newborns by raising the alarm if the baby is
removed from the ward.
http://www.eurekamagazine.co.uk/article/10637/Rapid-response.aspx
Federal ID technology for private sector -- FiXs
By its very nature, the federated solution aids
in privacy because there is no central database and individual
data can be stored in only one [vetted] place,"
Dr. Mestrovich said. Yet the distributed design and
cross-organizational model found in the FiXs
implementation does offer the possibility of a future national or
international identity management system that
might cross borders and organizational boundaries.
"The federated approach can actually take the place of a
mandated National ID system," Dr. Mestrovich stated.
..... " policy and implementation agreements
would be needed among federal, state, and local government
agencies as well as corporate governance boards, civil
libertarians, foreign governments, and the population at
large."
http://groups.google.com/group/Bible-Prophecy-News/browse_thread/thread/4753b39a518d36a3/f68fb73f4d6abedc#f68fb73f4d6abedc
Global databank of fingerprints -- by Pierre Thomas
-- electronic dragnet ... biometric
Around the clock, government computers and
forensic examiners compare fingerprints the U.S. government and
its partners in other countries have collected to the prints of
foreign nationals entering the United States
A secret facility outside Washington, D.C.,
houses a database containing more than 60 million fingerprints.
http://www.abcnews.go.com/WN/LegalCenter/story?id=3348425&page=1
Government allowed to wiretap:
Ed: Does this mean Nixon did nothing wrong ??
http://www.pcworld.com/article/id,134223-c,legalissues/article.html
Monitoring vehicles with chips
http://rinf.com/alt-news/new-world-order/the-new-world-order-tracking-device-rfid/558/
EU's " VIS " : 70 million fingerprints database
The EU bloc has taken the final step towards having the world's largest biometric database with 70
million sets of fingerprints, designed to boost border
security by allowing EU states to share data on short-stay visas
and visa applications from non-EU citizens who wish to enter the
Schengen free-travel zone. On Tuesday (12 June), EU interior
minister gave
http://euobserver.com/9/24261
Big Profits for Big Brother
"Although it should be working on its
corporate ethics, BAE Systems is working on an "Onboard
Threat Detection System." The system consists of
tiny cameras and microphones implanted
in airline seats. The Onboard Threat
Detection System records every facial
expression and every whisper of
every passenger, allowing watchful eyes and ears to
detect terrorists before they can strike. BAE says its system is
so
sophisticated that it can differentiate between nervous flyers
and real terrorists.
No thought is given to whether the intrusion from the
protection is a
greater threat than possible terrorist acts by foreigners
http://groups.google.com/group/Bible-Prophecy-News/browse_thread/thread/562b16dbc22ffcac/5f5fb67e51a4a7b6#5f5fb67e51a4a7b6
How various security systems work
http://computer.howstuffworks.com/fingerprint-scanner6.htm
"Every step you take, I'll be watching you "
http://heydudewheresmycountry.blogspot.com/2007/02/big-brother-is-watching-part-2.html
Wireless ( WiFi ) cameras, audio
The development of wireless network cameras is
opening up new opportunities such as monitoring homes and small
offices via the Internet, and the partnership between LGIT and
Nanoradio is aimed at helping to meet the anticipated increase in
demand for WiFi-based surveillance. The network camera is already
being used by a customer in a WiFi monitoring system that has
been designed for resident and enterprise users in Europe
http://sev.prnewswire.com/computer-electronics/20061222/3311410en-1.html
SmartCatch video surveillance
SmartCatch can identify people who are loitering
and objects that are left behind in security zones, as well as
people going the wrong way through exits (e.g. going back out
through entry barriers). Other benefits include alerting staff
for the full range of behaviour scenarios which also include
stopped vehicle, vehicle tailgating and removed objects by
providing automatic real-time warnings via mobile phone, PDA or
pager. The software supports all current mobile communications
devices that run on Palm OS, Windows CE and Symbian. SmartCatch
was developed by Vidient Solutions, which was spun off from
NECs US Research and Development Centre in 2003
http://www.securitypark.co.uk/article.asp?articleid=25991&CategoryID=1
US Companies helps China to crack down on dissidents --"Golden Shield "
Cisco, Oracle, and other U.S. companies [ Ed: Motorola, EMC, Extreme Networks, IBM , Nortel Networks,
and Sun Microsystems.] are supplying China's police
with software and gear that can be used to keep tabs on criminals
and dissidents
"ideological investigations" [ Ed: one's personal beliefs, faith,
religion, morals, ideas, ethics, mores, lifestyle ]
The ministry uses the software to manage digital
identity cards [ Ed:
Smart card IDs ] that are replacing the paper ID that
Chinese citizens must carry.
The scramble to sell technology to Chinese law enforcers seems,
for starters, to be at odds with the intent of an American export
law enacted after the massacre of hundreds of pro-democracy
demonstrators in Tiananmen Square in 1989. The Tiananmen
sanctions prohibited the export "of any crime control or
detection instruments or equipment" to China. "We
wanted to undermine the effectiveness of the police in rounding
up, imprisoning, and torturing political dissidents, not only
those involved in the Tiananmen Square movement, but for years to
come," explains Representative Tom Lantos (D-Calif.), who
helped draft the law
The U.S. State Dept. says that the Communist government is
holding at least 260,000 people in ideological
"reeducation" camps
But Lantos, the California congressman, says the sanctions
have been undermined. "The Commerce Dept.'s decision to
interpret the law narrowly is absolutely unconscionable," he
argues. "By allowing American companies to sell high-tech
computer and communications devices to the Chinese police, our
nation is directly aiding in the suppression of political dissent
in China."
Oracle, provider of smart-card software to the Ministry of Public
Security, does one-third of its business in China with the
government, says Derek Williams, head of the company's
Asia-Pacific Div....
American software can be traced to modernization efforts
supporting at least one arm of the Chinese ideological
enforcement apparatus: the State Council Leadership Team for
Preventing & Handling Cults. More commonly known as the 610
Office, a reference to the date in 1999 on which it was created,
this body tracks followers of unauthorized religions
Some of the data were drawn from China's
elaborate hukou,
the household registration system that helps the government
monitor and control the population.
The digitization of hukou,
an enormous task that is part of the Golden Shield project, has
involved American technology, including software provided by EMC,
according to EMC executives. "Aside from the public security
bureau's use of technology for criminal cases, the most
important [use] is the tracking and suppression of Falun Gong
followers," says Hao. The American companies emphasize
that they don't determine how the Chinese use their products
http://www.businessweek.com/magazine/content/06_38/b4001067.htm?chan=tc&chan=technology_technology+index+page_more+of+today's+top+stories
"SkySeer" Drone over Los Angeles --JUne 16, 2006
http://www.libertycoalition.net/node/237
Police launched the future of law enforcement
into the smoggy Los Angeles sky on Friday[ June 16, 2006 ] in the
form of a drone aircraft, bringing technology most commonly
associated with combat zones to urban policing.
The unmanned aerial vehicle, which looks like a childs
remote control toy and weighs about 5lb (2.3kg), is a prototype
being tested by the Los Angeles County Sheriffs Department.
The drone comes equipped with low-light
and infrared capabilities and can fly at speeds up to
30mph (48kph) for 70 minutes.
A small camera capable of tilt and pan
operations is fixed to the underside of the drone which sends the
video directly to a laptop command station.
Once launched, the craft is set to fly autonomously with global
positioning system (GPS) coordinates and a fixed flight pattern.
As technology improves, the drone will be outfitted with zoom
capabilities. For now, the craft simply flies lower to hone in on
its target.
Sometimes birds take notice of the slow-flying SkySeer. In
fact, we talked about making it look
like a bird to make it more environmentally
benign, said Heal.
"curse not the king, no not
in thy thought; and curse not the rich in thy bedchamber:
for a bird of the air shall carry the voice, and that which hath
wings shall tell the matter." -- Ecclesiastes 10:20
The plane is virtually silent and invisible, said Heal.
It will give us a vertical perspective that we have never
had.
Do we really want to live in a society where our backyard
barbeques will be open to police scrutiny?
http://www.gulf-times.com/site/topics/article.asp?cu_no=2&item_no=92499&version=1&template_id=43&parent_id=19
http://www.gulf-times.com/site/topics/printArticle.asp?cu_no=2&item_no=92499&version=1&template_id=43&parent_id=19
Content sharing council
Research will focus on critical issues in identity
management, information sharing policy and data
protection, said Dr. Gary Gordon, a Utica College
professor and expert in cybercrime and identity fraud.
Founding partners of the Center for Identity
Management and Information Protection include LexisNexis
Inc. and IBM Corp., the U.S. Secret Service and the
FBI. Participating schools include Carnegie Mellon
University, Indiana University and Syracuse
University.
The center will be established in upstate New York at Utica
College, which pioneered the nation's first curriculum on
white-collar crime in 1988
http://www.breitbart.com/news/2006/06/27/D8IGPQF80.html
BB = BB .... Big BUSINESS
as Big Brother
But how many of us realise that when we
travel about, each of us is captured, on average, 300
times a day on CCTV, and should we be
concerned?
"It's everywhere, absolutely everywhere," she
says.
"As we move throughout cities, throughout our jobs and
lives, there are technologies and devices everywhere which
capture our movements, capture our activities, which are then stored
on databases as evidence of what we've been
doing
Take the Oyster card, for example, which millions of us
use each day to pay for our journeys when travelling on London's
tubes and buses. Not only do the cards record payment,
but they can also track travellers' journeys across the city.
Employers watching employees -- Page One
-- Feb. 19, 2006
What's more, employer surveillance of workers and property
extends beyond the video screen: The boss can tell just what Web
sites you've visited on office computers, the content of e-mail
you haven't even sent, even your every move through cell phones
equipped with global positioning. And coming soon: Employee
identification through biometrics -- measuring such biological
components as fingerprints and voice pattern -- as
well as grain-of-wheat-sized chips implanted under the skin,
turning you, in effect, into an EZPass.
http://www.newsday.com/business/ny-bzcov0219,0,7304100.story?coll=ny-business-leadheadlines
continued on page Two
And security measures on the horizon have Maltby
concerned. Two security professionals in Cincinnati voluntarily
had tiny radio frequency identification chips embedded in
their arms -- to forgo carrying worker identification
cards. Using such chips for recognition only is harmless enough,
says Maltby. But long-term? "It's bad enough some employees
have to carry a GPS tracking device in their hands.
The thought of having the device implanted in your body is
frightening."
http://www.newsday.com/business/ny-bzcov0219,0,7304100.story?page=2&coll=ny-business-leadheadlines
e-mail spying approved
http://www.covenantnews.com/newswire/archives/018475.html
Satellite to
spy on home-improvements, additions, changes etc.
no more "hiding places" ( like during WW 2 )
"Images of new conservatories and garages
taken from space will be used to hike up council taxes and other
property levies, official guidance obtained by The Independent on
Sunday reveals.
Mr Prescott's department is overseeing the creation of a database
containing the details of every house in Britain to help tax
inspectors to assess new charges
The public have already expressed concern
at the prospect of inspectors with cameras
entering their homes
The Government is planning to compile a
database of every home in Britain, which
will include details of how many bedrooms each
house has and what kind of roof it has
But the Government's Valuation
Office Agency is still rolling out a
"Computer Assisted Mass Appraisal"
database
across England. So far almost two million
homes in England have had "value
significant codes" recorded"
http://news.independent.co.uk/uk/politics/article335970.ece
US Gov: massive data-mining into the minutiae of our lives
Ed: Probing, Analyzing, Profiling,
guessing at motives and intents and purposes
Taking guessing to its highest art-form ; making
fact out of fiction ; clairvoyance amok
The US government is developing a
massive computer system that can collect huge
amounts of data and, by linking far-flung
information from blogs and e-mail to government records and
intelligence reports, search for
patterns [ Ed: profiling
] of terrorist activity.
The system --- parts of which are operational, parts of which are
still under development ---- is already credited with helping to
foil some plots. It is the federal government's
latest attempt to use broad data-collection
and powerful analysis
[ Ed: profiling] in the fight against terrorism. But by delving
deeply into the digital minutiae of
American life, the program is also raising concerns that the
government is intruding too deeply into citizens' privacy
The core of this effort is a little-known system called Analysis,
Dissemination, Visualization, Insight, and Semantic
Enhancement (ADVISE). Only
a few public documents mention it. ADVISE is a research and
development program within the Department of Homeland Security
(DHS), part of its three-year-old "Threat and Vulnerability,
Testing and Assessment" portfolio. The TVTA received nearly
$50 million in federal funding this year
A major part of ADVISE involves data-mining - or "dataveillance,"
as some call it. It means sifting through data to
look for patterns. If a supermarket finds
that customers who buy cider also tend to buy fresh-baked bread,
it might group the two together.
http://www.csmonitor.com/2006/0209/p01s02-uspo.html
Chicago: "Operation Virtual Shield"
City Hall is now finalizing a contract for "Operation
Virtual Shield," Daley's Big Brother
plan to link 1,000 miles of "sometimes stand-alone
fiber" into a unified "homeland security grid" --
complete with sensors
to monitor the city's water supply and detect
chemical and biological weapons.[ Ed: among
other things]
The city also made an unprecedented offer to the private sector.
Businesses that agreed to pay an undisclosed fee would have
cameras outside their entrances and even in their stairwells monitored
by the 911 center
London has 200,000 cameras monitoring virtually
every public move its citizens make. Daley wouldn't go so far as
to say he wants to duplicate the London network. He would only
say he's "looking for more and more cameras all over."
The mayor endorsed the camera mandate after
unveiling a $4 million incident center at the 911 building that,
among other things, will serve as the new home for Snow Command.
http://www.suntimes.com/output/news/cst-nws-camera31.html
Police State ... funded by the CIA --- Stalin's dream come true
Networked Surveillance cameras with database-power wastes no time
" But surveillance companies, using networks
of cheap Web-connected cameras and powerful new
video-analysis software, are starting to turn the
Hollywood model into reality. Faces and license plates can now
be spotted, almost
in real time, at ports, military bases and
companies. Security perimeters can be changed or
strengthened with a mouse click. Feeds from
hundreds of cameras can be combined into a single
desktop view. And videotape that used to take hours, even days,
to scour is searched in minutes"
"The system shows
more than what the cameras see. Often, it can tell who the
cameras are watching, too.
The 3VR software assigns
an identification number to every person
a camera spots and establishes a profile
based largely on the geometry of the person's face. Whenever the
face is captured from a different angle or in a different light,
the system creates another mathematical model. Each time a person
is taped, another model is added to the profile, increasing its
accuracy. Once the profiles reach a certain critical level
of detail, it becomes fairly simple to search
the so-called motion events to find out where someone has been.
It is essentially the same as entering a name on Google"
"The system can also set off an
alert almost instantly if someone on a watch list enters a
building or a restricted area That ability is
one reason the Central Intelligence Agency
has become interested in the company, said Gilman Louie, who
recently stepped down as the chief executive of In-Q-Tel, the
agency's investment arm. It took part in a $10 million
round of financing for 3VR, a 25-employee company led by former
executives at TiVo and Inktomi, an Internet distribution company"
"But Bruce Schneier, a security expert and
the founder of Counterpane Internet Security, in Mountain View,
California, questioned the real purpose of systems like 3VR's.
"These things aren't designed to catch the bad guys,"
Schneier said. "They're for watching the good and the
stupid. The bad guys, they'll just wear a hat and sunglasses the
day that they want to avoid the camera." (Russell of 3VR
says that his software can see through some disguises"
"To Schneier, the camera networks are part
of a larger trend - along with Britain's plans to
monitor every car on every major road, and the National Security
Agency's eavesdropping program in the United States - toward
"wholesale surveillance, the kind of stuff Stalin only
dreamed of," he said"
http://www.iht.com/articles/2006/01/26/business/video.php#
Cool tools : loosing our Privacy
"While you were IM'ing
a friend about what Santa brought, downloading
Mariah to your iPod and snapping pictures
of the kids playing Xbox on your new walkie-talkie cell phone,
Big Brother stopped by.
He rummaged through your hard drive and found
your credit card number (the one you used
for the Xbox 360 game). He took a peek at the Web
sites you've visited (naughty, naughty).
And he jotted down your e-mail password
(who in the world is RedHotMama?).
The highest toll on the information
superhighway is our privacy, it seems
Or are we, as the late social critic Neil Postman
fretted, amusing ourselves to death?
The shocking thing in all these examples is not
the technology itself but how quiescent we've been in accepting
intrusion. Even the idea of a spychip has lost its power to
unnerve.
Much more is at stake than the security of a
credit card or an eBay account; it's our freedom draining away.
As Justice Louis Brandeis
warned as early as 1928, when he famously dissented on the use of
wiretaps to convict bootlegger Roy Olmstead,
"Discovery and invention have made it
possible for the government, by means far more effective than
stretching upon the rack, to obtain disclosure in court of what
is whispered in the closet."
But buck up, it's a new year. Go over to that PC, delete those
cookies, erase that cache, clear credit card numbers from forms,
remove health-related info, run those anti-virus programs."
http://www.newsobserver.com/105/story/383837.html
ALL entry-ports
controlled ( US-Visit)
( or should it say "all exits" )
Every port of entry into the United
States - land, sea or air - is now equipped with the system,
US-Visit, which takes fingerprints and digital photos of many
entering foreigners to check them against criminal and terrorist
watch lists. The 115 U.S. airports with international traffic, as
well as 15 sea and 154 land ports of entry, all now have the
equipment, which is linked to
a national computer network that in a matter of seconds can check
a visitor's fingerprints against a database of
known terrorists and criminals
http://www.iht.com/articles/2005/12/30/news/border.php
Don't Fence
Me In ... Hemmed in on ALL
sides ( land and sea )
1. "Athena" port-control by Raytheon
Maritime Domain Awareness System ( C 4 ISR )
http://www.spacewar.com/news/terrorwar-05zzzzzq.html
2. Mexican Border closing
Dec. 15 - House Republicans voted on
Thursday night to toughen a border security bill by requiring the
Department of Homeland Security to build five fences along 698
miles of the United States border with Mexico to block the flow
of illegal immigrants and drugs into this country.
But the vote was sharply assailed by
Democrats, who compared the fences to the Berlin Wall in Germany.
Twelve Republicans also voted against the amendment.
http://www.nytimes.com/2005/12/16/politics/16border.html
3. Canadian and Mexican Border Closings
The U.S. House of Representatives voted late Thursday to consider erecting
"physical barriers" along the American border with
Canada, the firmest step yet toward building the kinds of fences
now in place on the Mexican frontier to stop the northward flow
of illegal aliens and smuggled goods.
The motion cleared the way for about 1,100
kilometres of new fencing along the U.S.-Mexico border
in Texas, New Mexico, Arizona and California, but also urged the
agency to "conduct a study on the use of physical barriers along the northern border
Sponsored by Rep. Duncan Hunter, a
California Republican who has long championed fences and walls to
halt illegal crossings in the southwestern U.S., the plan to shore
up America's borders passed by a vote of 260-159 on
Thursday but was strongly denounced by some Democrats as a
"Berlin Wall" for North America
Rep. James Sensenbrenner
of Wisconsin, one of the strongest proponents of the immigration
bill and a backer of the Hunter amendment,
http://www.canada.com/saskatoonstarphoenix/story.html?id=adb8fb97-ddce-4524-b571-4c1ccf6403b8&k=40788
Last month, U.S. Homeland Security
Secretary Michael Chertoff announced a secure-border initiative
that provided for increased use of unmanned "drone"
aircraft, infrared cameras and other high-tech surveillance
measures, as well as increased staffing, to patrol the Mexican
and Canadian borders
Even before passage of Hunter's proposal, Mexican President
Vincente Fox had denounced border fencing as a "disgraceful
and shameful" initiative that violates human rights and does
nothing for the U.S. economy.
http://www.canada.com/saskatoonstarphoenix/story.html?id=adb8fb97-ddce-4524-b571-4c1ccf6403b8&k=40788&p=2
Live Scan
electronically sends fingerprint to DoJ for security
clearance
Dept. of Justice .. pre-registration required ( 3 days .... 72
hours advance time)
THE LIVE SCAN PROCESS IS REPLACING FINGERPRINT CARDS.
Live Scan technology electronically transmits fingerprints
directly to the Department of Justice (DOJ) and reduces delays
with processing hardcopy cards. Live scan fingerprints that
result in clearances are now transmitted electronically to
the ATCS registry,
usually within 72 hours
DOJ fingerprint results are sent to the Aide and
Technician Certification Section (ATCS) for
certification as a nurse assistant or home health aide. DOJ
also send fingerprint results to ATCS for certain employees of
Intermediate Care Facilities for the Developmentally Disabled,
Adult Day Health Care facilities, and Home Health Agencies.
http://www.dhs.ca.gov/lnc/cert/Fingerprint.htm
Workforce
Central : Employee fingerprints
Fuel pump manufacturer Tokheim has introduced a
fingerprint scanner to monitor the working hours of its employees
and integrate the results directly into its payroll and HR
system.
This month the company will finish installing Kronos Systems'
Workforce Central
to monitor and manage attendance at its Dundee manufacturing site
The system will enable Tokheim's supervisors to deal with
absence or lateness immediately, and management will gain data
analytics tools. "With staff located across a large area it
is essential that supervisors know when production might be
affected by staff shortages," it said
http://www.prisonplanet.com/articles/march2005/020305fingerprintscan.htm
Galileo
The Paris-based European Space Agency
plans to launch a second test satellite, Giove B, before sending
a total of 30 satellites into
orbit to run the system, which could begin commercial
[ Ed : $ ] operations
as soon as 2008. Galileo's developers
say it is designed for civilian rather than military use. It will
offer more precise data than the U.S. system, allowing users to
navigate to the nearest meter, or 3.3 feet, rather than the
nearest five meters, now the standard in GPS technology
China and Israel contributing
financing to Galileo, and with European governments aiming to
develop technology that is more accurate and reliable than the
current U.S. system
The primary contractors on the E3.8
billion, or $4.5 billion, project are European aerospace giant
EADS, Thales and Alcatel of France, Inmarsat of Britain, the
Italian contractor Finmeccanica and the Spanish companies AENA
and Hispasat
http://www.iht.com/articles/2005/12/28/business/galileo.php
Now you can be arrested for anything
Today there ( England) ; tomorrow here ( America and anywhere )
"Here, there and everywhere " ubiquitous
"Police are to be given sweeping powers to arrest
people for every offence, including dropping litter,
failure to wear a seat belt and other minor misdemeanours.
The measures, which come into force on Jan 1, are the biggest
expansion in decades of police powers to deprive people of their
liberty.
At present, officers can generally arrest people if they suspect
them of committing an offence which carries at least
five years in prison. They
will now have the discretion to detain [
Ed : "detainees" ] someone if they suspect
any offence and think that an arrest is "necessary
http://www.telegraph.co.uk/news/main.jhtml;jsessionid=KSV3NS3NR1APHQFIQMFSFGGAVCBQ0IV0?xml=/news/2005/12/29/narrest29.xml&sSh
eet=/portal/2005/12/29/ixportaltop.html
Galileo and Satellite-navigation ( sat-nat) of cars - ( PHOTOS )
http://news.bbc.co.uk/2/hi/science/nature/4552132.stm
What is Echelon ?
www.jvim.com/IntelligenceBriefing/jan1999/newworldorder.html #2
www.jvim.com/IntelligenceBriefing/june1999/mark.html #1
http://www.cyber-rights.org/interception/echelon/
http://www.transnationale.org/anglais/sources/information/controle_echelon_faq.htm
http://www.geek-guy.com/echelon.html
You can run but you cannot hide
www.popsci.com/scitech/features/spy_sky/index.html
Big Brother Surveillance continued Page five
Salvation hopetotheend.com/sal.html
Bible www.blueletterbible.org
I Have Decided to
Follow Jesus
Song
: http://ingeb.org/spiritua/ihavedec.html