Hope To The End
BigBro page 2 ....... BB pg 3 ...... page 4 ...... page 5 ..... Privacy ...... Mobile Phone Stalking
"Fear none of those things which thou shalt suffer. " Revelation 2:10
SURVEILLANCE, MONITORING and CONTROL (page one)
the eyes and ears of Big Brother --- the SYSTEM
"Beware....for there is nothing covered, that shall not be revealed;
neither hid, that shall not be known.
Therefore whatsoever ye have spoken in darkness shall be heard in the light;
and that which ye have spoken in the ear in closets (phones, emails etc.)
shall be proclaimed upon the housetops" Luke 12: 1-3
A Police State depends upon neighbors and relatives who report on neighbors and relatives.
"Trust ye not in a friend, put ye not confidence in a guide:
keep the doors of thy mouth from her that lieth in thy bosom .
For the son dishonoreth the father, the daughter riseth up against her mother,
the daughter-in-law against her mother-in-law;
a man's enemies are the men of his own house." Micah 7:5,6....
Matthew 10:36 "A man's foes shall be they of his own household."
"Fear them not therefore; for there is nothing covered, that shall not be revealed;
and hid, that shall not be known." Matthew 10:26
"For there is nothing hid, which shall not be manifested;
neither was anything kept secret, but that it should come abroad.
If any man have ears to hear, let him hear." Mark 4:22
Parental surveillance causes resentment and resistance:
Matthew 10:21and Mark 13:12; and Luke 21:16;
"the night ( and day) has 1,000 eyes" (and ears too !)
Echelon, Magic Lantern , Carnivore, Blue Tooth, QinetiQ, Galileo, Passport, Trojan Horse, FACEit,
OPLAN etc. etc. etc.
NSA--top spy agency
Spies on UN
The details were in a memo, leaked to the paper, written by Frank Koza, a top official at the National Security Agency, America's key and highly secretive intelligence agency.
The memo has been circulated to senior NSA agents and to a friendly foreign intelligence agency, believed to be Britain, asking for its input.......
The NSA's surveillance operation is believed to have been requested by President Bush's National Security Adviser, Condoleezza Rice, and reveals the scope and intensity of spy operation against supposedly friendly nations at the Security Council.
Mr [Frank] Koza, the chief of staff of the agency's regional-targets section, http://www.theage.com.au/articles/2003/03/02/1046540068572.html
See Berit Kjos on Surveillance
Someone wanted to know what the definition of "Big Brother" was.
It is when government is overly invasive in your life, under the pretext of caring for your best interests.
It is the monitoring and tracking of every movement and conversation of an individual. It is profiling that person by subjectively analyzing data into an arbitrary, and oftentimes erroneous, one-sided interpretation of the facts. Unrelated bits and pieces of information about a person are then forced into a concocted-relationship of events and then fed into databanks that hold one's portrait frozen and labeled, and networks that data to anyone who can access that information.
Since that databank is all-inclusive, one can access for a specific concern, and yet receive that person's cryptic and terse report on his whole life.....
information that should remain private, and under the control of that individual.
Instead ...... government, agencies and certain people in high places have more control over an individual than the individual has over his own life. That is called tyranny.
Voodoo Presumption : Taking that subjective analysis and then attempting to project the future decisions of that individual. This is an extreme form of imagination, and highly erroneous. This is to step in--- as a usurping god---- and determine for another his will, intent and motives. It is grossly unlawful.
"He shall cause craft to prosper" -- Daniel 8:25
( Government seeks to marshal, rally and employ as many people as possible in this venture of snooping and reporting on the activities of others.)
"the lesson of the 21st century is, if you give data to governments, it keeps getting passed along to other hands,"
the lawyer said.
the newswire: fair educational use
Big neighbor reporting on you
Future tracking of mileage tax
"Sara was late for work. The alarm clock didn't alarm, the kids were unusually slow getting ready for school, and nothing went right. She finally got to her car a brand new 2020 Chevy Adventure. She touched the finger-print secured start button. Nothing. It wouldn't start. She touched it again. Nothing. Furious, she banged the steering wheel with her fist. Then she noticed the paper hanging from the receipt printer on the dash.
"Your designated visa account rejected your Road Use Tax in the amount of $87.32 for the month of June, 2020. You must insert a valid account card to activate your automobile."
It's coming. With a $16 million grant from the federal government, the University of Iowa is developing a Global Positioning Satellite system that can measure the mileage, apply a variable tax rate that will increase during rush hours and in high-traffic areas, calculate the total, charge a designated account card, and shut down your automobile if unpaid when due. Some 2,700 automobiles in five states will be used in the test.
Little Bro: Citizens hacking IDs of citizens
Secret rooms at NSA shielding the government
Courtroom evidence: Your cell phone will be used against you
DARPA's Cyberspace control ( NSA )
Big Brother Technologies
Environmental and Security monitoring --tracking food ... Ed: overseen by the false prophet ??
"Part of the agreement centred on the need to push Global Monitoring for Environment and Security (GMES) from the research stage into the operational stage. The technology has been developed to help monitor phenomena such as natural disasters or the mapping of international shipping lanes and harvest distributions. [Ed: food tracking ]
The Earth [ Ed: GMES] observation system will use airborne satellites and a system of sensors on the ground and in the sea to record data.
Answer Government PERSONAL questions or be fined $5,000.00
Pentagon want "Cyber command "
"WASHINGTON (Reuters) - The Pentagon plans to create a new military command for cyberspace, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare, the New York Times said on Friday."
EU wants 'Internet G12' to govern cyberspace
The European Commission wants the US to dissolve all government links with the body that 'governs' the internet, replacing it with an international forum for discussing internet governance and online security.The rules and decisions on key internet governance issues, such as the creation of top level domains
(such as .com and .eu) and managing the internet address system that ensures computers can connect to each other, are currently made by the Internet Corporation for Assigned Names and Numbers (ICANN), a private, not-for profit corporation based in California which operates under an agreement with the US Department of Commerce.Commissioner Reding wants internet governance fully privatised but overseen by an international forum .The decisions made by ICANN affect the way the internet works all around the world.
Instead, Brussels would prefer that an international government forum that to meet twice a year makes recommendations by majority vote to the newly privatised ICANN. The forum would be restricted to representatives from 12 countries, with a regional balance taken into consideration.
Digital Converter box for TV has microphone and camera in it .
You are being listened to -- and watched-- in your own home
"By installing covert spy devices and hidden microphones inside our all but mandatory digital boxes, the government and whatever corporate entities get a slice of the pie, have direct access to our living rooms. This is the ultimate Big Brother scenario whereby the majority of Americans and Europeans will have Orwellian telescreens watching their every move.
Many will dismiss such claims as conspiracy fodder, but the fact is that Americans have been spied on for decades, previously under the Echelon program and more recently as part of the Bush administrations warrantless wiretapping program."
Big SNOOP : ALL forms of communication monitored
Smart Phones and surveillance ability Be careful who you call
..." suspicious employers, parents and spouses get to see the full text of all SMS messages sent or received, plus a list of all calls including phone number, time and duration.
The spyware works by transferring the information to an Internet server as soon as it is connected, so it remains available even if the user erases the iPhone's internal log.
The records can then be viewed on the server via a web browser, or downloaded in CSV form for use in a local database or spreadsheet.
According to vendor Retina-X Studios, "Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the iPhone."
" Both my new laptop and my cell phone have built-in cameras. The cellphone also has GPS and 24/7 Internet connectivity, so it is the perfect surveillance device."
From Yelena Slatery
With the melding of private corporations and government, a Fascistic world order is becoming not just a possibility but a REALITY. Not only will most of the world 's citizens be watched in all but a few corners of their private space but databases full of facial recognition , fingerprints, DNA, biographical and medical information will be stored somewhere with someone in an unseen part of cyberspace that can be brought up within virtual seconds without your knowledge. When the corporate world cannot be seperated from a globally controlled government, it's time to re-think our long term goals.
Even more Snooping on your private personal computer
They can also use a surveillance vehicle or neighbouring property to hack into a wireless internet connection.
The most intrusive technique involves breaking into a property to fit a device to a computer which logs key strokes on the keyboard and transmits the results back to a listening station.
The Association of Chief Police Officers said remote surveillance was regulated by the Regulation of Investigatory Powers Act (Ripa).
MI5 and GCHQ monitor the internet through a network of "black boxes" attached to servers but they are looking at ways of expanding the system and want to be able to link up more government databases to catch criminals.
Huge interconnecting Law enforcement database created --N-DEx
WASHINGTON, March 6 (UPI) -- A huge database allowing federal, state and local law enforcement officials in the United States access to hoards of records is in the offing, officials said.
The National Data Exchange within the U.S. Justice Department system hooks up millions of criminal investigative records from thousands of law enforcement agencies stored in data warehouses, giving investigators and analysts a powerful tool to combat crime and seek out terrorist plots, The Washington Post reported Thursday.
The N-DEx system is set to phase in as early as this month [ March 2008 ] . When operational, N-DEx, developed by Raytheon for $85 million, will permit 200,000 state and local investigators and federal counter-terrorism investigators to search millions of police reports in some 15,000 state and local agencies, with a few clicks of a computer mouse, the newspaper account said.
Coplink --how it tracks --1,600 law-enforcement agencies that uses a commercial data-mining system called Coplink.
With Coplink, police investigators can pinpoint suspects by searching on scraps of information such as nicknames, height, weight, color of hair and the placement of a tattoo. They can find hidden relationships among suspects and instantly map links among people, places and events. Searches that might have taken weeks or months - or which might not have been attempted, because of the amount of paper and analysis involved - now are done in seconds.
She told the system to also search data warehouses built by Coplink in San Diego and Orange County - which have agreements to share with Tucson - and came up with the name of a particular suspect, his age and a possible address. She asked the software to find the suspect's links to other people and incidents, and then to create a visual chart displaying the findings. Up popped a display with the suspect at the center and cartoon-like images of houses, buildings and people arrayed around him. A final click on one of the houses brought up the address of an apartment and several new names, leads she could follow.
"The power behind what we have discovered, what we can do with Coplink, is immense," Tucson police Chief Richard Miranda said. http://www.mercurynews.com/politics/ci_8472527
Sensors tracking us all day long; "sniffers"; rfid tag readers
"Protect America Act " + more = total surveillance
Senate OK's immunity for utilities aiding warrantless wiretapping
The temporary surveillance law, approved under heavy White House pressure, gives the government broad powers to eavesdrop on the communications of terrorism suspects without warrants. It effectively legalized many of the practices employed by the National Security Agency as part of a secret program approved by Bush in late 2001.
The White House and Republican lawmakers are pushing to make the law permanent while also adding legal protections for telecommunications companies, which face dozens of lawsuits. Most House Democrats and civil liberties groups strongly oppose immunity for the communications firms, but other Democrats - including Jay Rockefeller, chairman of the Senate intelligence committee - back the GOP [ warrantless wiretapping ] position.
Institutionalized Spying on Americans -- Homeland Seceruity's National Application Office -- NAO
and REAL ID Cards
by Stephen Lendman
The Department of Homeland Security (DHS) established a new domestic spying operation in 2007 called the National Applications Office (NOA) and described it as "the executive agent to facilitate the use of intelligence community technological assets for civil, homeland security and law enforcement purposes within the United States." The office was to begin operating last fall to "build on the long-standing work of the Civil Applications Committee (CAC), which was created in 1974 to facilitate the use of the capabilities of the intelligence community for civil, non-defense uses in the United States."
Aeris, GPSPursuit remote live monitoring
Aeris's network enables GPSPursuit's GPS Tracking Units to deliver tracking and monitoring services to commercial fleets, providing fleet managers with on-the-fly dispatching and the ability to monitor vehicles to increase efficiency and decrease operation costs. The GPS Tracking Units are also used as personal tracking devices for Alzheimer's patients, children and valuables.
US Spy Satellites to monitor US citizens
The U.S.'s top intelligence official has greatly expanded the range of federal and local authorities who can get access to information from the nation's vast network of spy satellites in the U.S.
Sometime next year [2008 ] , officials will examine how the satellites can aid federal and local law-enforcement agencies, covering both criminal and civil law. The department is still working on determining how it will engage law enforcement officials and what kind of support it will give them.
Access to the high-tech surveillance tools would, for the first time, allow Homeland Security and law-enforcement officials to see real-time, high-resolution images and data,
Charles Allen, the DHS's [ Dept. of Homeland Security ] chief intelligence officer, who will be in charge of the new program.
Access to the satellite surveillance will be controlled by a new Homeland Security branch -- the National Applications Office -- which will be up and running in October [ 2007 ]
Unlike electronic eavesdropping, which is subject to legislative and some judicial control, this use of spy satellites is largely uncharted territory [ Ed: not subject to limitations]
In recent years, some military experts have questioned whether domestic use of such satellites would violate the Posse Comitatus Act. The act bars the military from engaging in law-enforcement activity inside the U.S., and the satellites were predominantly built for and owned by the Defense Department.
There is little if any policy, guidance or procedures regarding the collection, exploitation and dissemination of domestic MASINT." MASINT " stands for
" Measurement and Signatures Intelligence " , a particular kind of information collected by spy satellites which would for the first time become available to civilian agencies.
According to defense experts, MASINT uses radar, lasers, infrared, electromagnetic data and other technologies to see through cloud cover, forest canopies and even concrete to create images or gather data.
The spy satellites are considered by military experts to be more penetrating than civilian ones: They
not only take color, as well as black-and-white
photos, but can also use different parts of the light spectrum to
track human activities, including, for example, traces left by
chemical weapons or heat generated by people in a building.
You are talking about enormous power," said Gregory Nojeim, senior counsel and director of
the Project on Freedom, Security and Technology for the Center for Democracy and Technology,
http://www.cdt.org/speech/ . . . . . . http://cdt.org/standards/
a nonprofit group advocating privacy rights in the digital age. "Not only is the surveillance they are contemplating intrusive and omnipresent, it's also invisible. And that's what makes this so dangerous."
CCTV to monitor / report chipped people everywhere - "Rapid Response"
Reader Paul Clarke proposed an RFID solution, which could overcome these difficulties. Citing the current level of integration of CCTV systems, he says: If there was a similar initiative to link the RFID systems used by shops to catch shoplifters, it would be possible to search for an RFID tag that could be surgically implanted under a childs skin or inserted into the fabric of their clothing.
Potentially this could be an international initiative that would mean that if an abductor attempted to take a chipped child into a store that subscribed to the service, store detectives would be notified and by cross-referencing with CCTV footage one could determine the identity of the individual [abducting a child].
Surgically implanting an RFID chip under a childs skin seems a little Orwellian, though putting it into the fabric of clothes seems more acceptable. Are parents likely to go to such extremes to ensure kids are safe, or is it a step too far?
However, as reader Roger Bamford pointed out, one US firm has already designed a human-implantable RFID chip.
VeriChip has developed a passive RFID microchip, inserted under the skin by injection, which contains a unique 16-digit identifier. The number on the chip which can be read with a proprietary scanner could be used to access medical records, or determine whether someone has the authority to enter a secure area, the company says.
Verichip has also designed wearable active RFID chips, designed for use within care homes or hospital wards. The chips sound an alarm if patients for instance, those with Alzheimers leave a designated area. It can even lock an exit as a patient approaches it. The chips can also be used to prevent the abduction of newborns by raising the alarm if the baby is removed from the ward.
Federal ID technology for private sector -- FiXs
By its very nature, the federated solution aids in privacy because there is no central database and individual data can be stored in only one [vetted] place,"
Dr. Mestrovich said. Yet the distributed design and cross-organizational model found in the FiXs implementation does offer the possibility of a future national or international identity management system that might cross borders and organizational boundaries. "The federated approach can actually take the place of a mandated National ID system," Dr. Mestrovich stated.
..... " policy and implementation agreements would be needed among federal, state, and local government agencies as well as corporate governance boards, civil
libertarians, foreign governments, and the population at large."
Global databank of fingerprints -- by Pierre Thomas -- electronic dragnet ... biometric
Around the clock, government computers and forensic examiners compare fingerprints the U.S. government and its partners in other countries have collected to the prints of foreign nationals entering the United States
A secret facility outside Washington, D.C., houses a database containing more than 60 million fingerprints.
Government allowed to wiretap:
Ed: Does this mean Nixon did nothing wrong ??
Monitoring vehicles with chips
EU's " VIS " : 70 million fingerprints database
The EU bloc has taken the final step towards having the world's largest biometric database with 70 million sets of fingerprints, designed to boost border security by allowing EU states to share data on short-stay visas and visa applications from non-EU citizens who wish to enter the Schengen free-travel zone. On Tuesday (12 June), EU interior minister gave
Big Profits for Big Brother
"Although it should be working on its corporate ethics, BAE Systems is working on an "Onboard Threat Detection System." The system consists of
tiny cameras and microphones implanted in airline seats. The Onboard Threat Detection System records every facial expression and every whisper of every passenger, allowing watchful eyes and ears to detect terrorists before they can strike. BAE says its system is so
sophisticated that it can differentiate between nervous flyers and real terrorists.
No thought is given to whether the intrusion from the protection is a
greater threat than possible terrorist acts by foreigners
How various security systems work
"Every step you take, I'll be watching you "
Wireless ( WiFi ) cameras, audio
The development of wireless network cameras is opening up new opportunities such as monitoring homes and small offices via the Internet, and the partnership between LGIT and Nanoradio is aimed at helping to meet the anticipated increase in demand for WiFi-based surveillance. The network camera is already being used by a customer in a WiFi monitoring system that has been designed for resident and enterprise users in Europe
SmartCatch video surveillance
SmartCatch can identify people who are loitering and objects that are left behind in security zones, as well as people going the wrong way through exits (e.g. going back out through entry barriers). Other benefits include alerting staff for the full range of behaviour scenarios which also include stopped vehicle, vehicle tailgating and removed objects by providing automatic real-time warnings via mobile phone, PDA or pager. The software supports all current mobile communications devices that run on Palm OS, Windows CE and Symbian. SmartCatch was developed by Vidient Solutions, which was spun off from NECs US Research and Development Centre in 2003
US Companies helps China to crack down on dissidents --"Golden Shield "
Cisco, Oracle, and other U.S. companies [ Ed: Motorola, EMC, Extreme Networks, IBM , Nortel Networks, and Sun Microsystems.] are supplying China's police with software and gear that can be used to keep tabs on criminals and dissidents
"ideological investigations" [ Ed: one's personal beliefs, faith, religion, morals, ideas, ethics, mores, lifestyle ]
The ministry uses the software to manage digital identity cards [ Ed: Smart card IDs ] that are replacing the paper ID that Chinese citizens must carry.
The scramble to sell technology to Chinese law enforcers seems, for starters, to be at odds with the intent of an American export law enacted after the massacre of hundreds of pro-democracy demonstrators in Tiananmen Square in 1989. The Tiananmen sanctions prohibited the export "of any crime control or detection instruments or equipment" to China. "We wanted to undermine the effectiveness of the police in rounding up, imprisoning, and torturing political dissidents, not only those involved in the Tiananmen Square movement, but for years to come," explains Representative Tom Lantos (D-Calif.), who helped draft the law
The U.S. State Dept. says that the Communist government is holding at least 260,000 people in ideological "reeducation" camps
But Lantos, the California congressman, says the sanctions have been undermined. "The Commerce Dept.'s decision to interpret the law narrowly is absolutely unconscionable," he argues. "By allowing American companies to sell high-tech computer and communications devices to the Chinese police, our nation is directly aiding in the suppression of political dissent in China."
Oracle, provider of smart-card software to the Ministry of Public Security, does one-third of its business in China with the government, says Derek Williams, head of the company's Asia-Pacific Div....
American software can be traced to modernization efforts supporting at least one arm of the Chinese ideological enforcement apparatus: the State Council Leadership Team for Preventing & Handling Cults. More commonly known as the 610 Office, a reference to the date in 1999 on which it was created, this body tracks followers of unauthorized religions
Some of the data were drawn from China's elaborate hukou, the household registration system that helps the government monitor and control the population.
The digitization of hukou, an enormous task that is part of the Golden Shield project, has involved American technology, including software provided by EMC, according to EMC executives. "Aside from the public security bureau's use of technology for criminal cases, the most important [use] is the tracking and suppression of Falun Gong followers," says Hao. The American companies emphasize that they don't determine how the Chinese use their products
"SkySeer" Drone over Los Angeles --JUne 16, 2006
Police launched the future of law enforcement into the smoggy Los Angeles sky on Friday[ June 16, 2006 ] in the form of a drone aircraft, bringing technology most commonly associated with combat zones to urban policing.
The unmanned aerial vehicle, which looks like a childs remote control toy and weighs about 5lb (2.3kg), is a prototype being tested by the Los Angeles County Sheriffs Department.
The drone comes equipped with low-light and infrared capabilities and can fly at speeds up to 30mph (48kph) for 70 minutes.
A small camera capable of tilt and pan operations is fixed to the underside of the drone which sends the video directly to a laptop command station.
Once launched, the craft is set to fly autonomously with global positioning system (GPS) coordinates and a fixed flight pattern.
As technology improves, the drone will be outfitted with zoom capabilities. For now, the craft simply flies lower to hone in on its target.
Sometimes birds take notice of the slow-flying SkySeer. In fact, we talked about making it look like a bird to make it more environmentally benign, said Heal.
"curse not the king, no not in thy thought; and curse not the rich in thy bedchamber:
for a bird of the air shall carry the voice, and that which hath wings shall tell the matter." -- Ecclesiastes 10:20
The plane is virtually silent and invisible, said Heal. It will give us a vertical perspective that we have never had.
Do we really want to live in a society where our backyard barbeques will be open to police scrutiny?
Content sharing council
Research will focus on critical issues in identity management, information sharing policy and data protection, said Dr. Gary Gordon, a Utica College professor and expert in cybercrime and identity fraud.
Founding partners of the Center for Identity Management and Information Protection include LexisNexis Inc. and IBM Corp., the U.S. Secret Service and the FBI. Participating schools include Carnegie Mellon University, Indiana University and Syracuse University.
The center will be established in upstate New York at Utica College, which pioneered the nation's first curriculum on white-collar crime in 1988
BB = BB .... Big BUSINESS as Big Brother
But how many of us realise that when we travel about, each of us is captured, on average, 300 times a day on CCTV, and should we be concerned?
"It's everywhere, absolutely everywhere," she says.
"As we move throughout cities, throughout our jobs and lives, there are technologies and devices everywhere which capture our movements, capture our activities, which are then stored on databases as evidence of what we've been doing
Take the Oyster card, for example, which millions of us use each day to pay for our journeys when travelling on London's tubes and buses. Not only do the cards record payment, but they can also track travellers' journeys across the city.
Employers watching employees -- Page One -- Feb. 19, 2006
What's more, employer surveillance of workers and property extends beyond the video screen: The boss can tell just what Web sites you've visited on office computers, the content of e-mail you haven't even sent, even your every move through cell phones equipped with global positioning. And coming soon: Employee identification through biometrics -- measuring such biological components as fingerprints and voice pattern -- as well as grain-of-wheat-sized chips implanted under the skin, turning you, in effect, into an EZPass.
continued on page Two
And security measures on the horizon have Maltby concerned. Two security professionals in Cincinnati voluntarily had tiny radio frequency identification chips embedded in their arms -- to forgo carrying worker identification cards. Using such chips for recognition only is harmless enough, says Maltby. But long-term? "It's bad enough some employees have to carry a GPS tracking device in their hands.
The thought of having the device implanted in your body is frightening."
e-mail spying approved
Satellite to spy on home-improvements, additions, changes etc.
no more "hiding places" ( like during WW 2 )
"Images of new conservatories and garages taken from space will be used to hike up council taxes and other property levies, official guidance obtained by The Independent on Sunday reveals.
Mr Prescott's department is overseeing the creation of a database containing the details of every house in Britain to help tax inspectors to assess new charges
The public have already expressed concern at the prospect of inspectors with cameras entering their homes
The Government is planning to compile a database of every home in Britain, which will include details of how many bedrooms each house has and what kind of roof it has
But the Government's Valuation Office Agency is still rolling out a "Computer Assisted Mass Appraisal" database across England. So far almost two million homes in England have had "value significant codes" recorded"
US Gov: massive data-mining into the minutiae of our lives
Ed: Probing, Analyzing, Profiling, guessing at motives and intents and purposes
Taking guessing to its highest art-form ; making fact out of fiction ; clairvoyance amok
The US government is developing a massive computer system that can collect huge amounts of data and, by linking far-flung information from blogs and e-mail to government records and intelligence reports, search for patterns [ Ed: profiling ] of terrorist activity.
The system --- parts of which are operational, parts of which are still under development ---- is already credited with helping to foil some plots. It is the federal government's latest attempt to use broad data-collection and powerful analysis [ Ed: profiling] in the fight against terrorism. But by delving deeply into the digital minutiae of American life, the program is also raising concerns that the government is intruding too deeply into citizens' privacy
The core of this effort is a little-known system called Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement (ADVISE). Only a few public documents mention it. ADVISE is a research and development program within the Department of Homeland Security (DHS), part of its three-year-old "Threat and Vulnerability, Testing and Assessment" portfolio. The TVTA received nearly $50 million in federal funding this year
A major part of ADVISE involves data-mining - or "dataveillance," as some call it. It means sifting through data to look for patterns. If a supermarket finds that customers who buy cider also tend to buy fresh-baked bread, it might group the two together.
Chicago: "Operation Virtual Shield"
City Hall is now finalizing a contract for "Operation Virtual Shield," Daley's Big Brother plan to link 1,000 miles of "sometimes stand-alone fiber" into a unified "homeland security grid" -- complete with sensors
to monitor the city's water supply and detect chemical and biological weapons.[ Ed: among other things]
The city also made an unprecedented offer to the private sector. Businesses that agreed to pay an undisclosed fee would have cameras outside their entrances and even in their stairwells monitored by the 911 center
London has 200,000 cameras monitoring virtually every public move its citizens make. Daley wouldn't go so far as to say he wants to duplicate the London network. He would only say he's "looking for more and more cameras all over."
The mayor endorsed the camera mandate after unveiling a $4 million incident center at the 911 building that, among other things, will serve as the new home for Snow Command.
Police State ... funded by the CIA --- Stalin's dream come true
Networked Surveillance cameras with database-power wastes no time
" But surveillance companies, using networks of cheap Web-connected cameras and powerful new video-analysis software, are starting to turn the Hollywood model into reality. Faces and license plates can now be spotted, almost
in real time, at ports, military bases and companies. Security perimeters can be changed or strengthened with a mouse click. Feeds from hundreds of cameras can be combined into a single desktop view. And videotape that used to take hours, even days, to scour is searched in minutes"
"The system shows more than what the cameras see. Often, it can tell who the cameras are watching, too.
The 3VR software assigns an identification number to every person a camera spots and establishes a profile based largely on the geometry of the person's face. Whenever the face is captured from a different angle or in a different light, the system creates another mathematical model. Each time a person is taped, another model is added to the profile, increasing its accuracy. Once the profiles reach a certain critical level of detail, it becomes fairly simple to search the so-called motion events to find out where someone has been. It is essentially the same as entering a name on Google"
"The system can also set off an alert almost instantly if someone on a watch list enters a building or a restricted area That ability is one reason the Central Intelligence Agency has become interested in the company, said Gilman Louie, who recently stepped down as the chief executive of In-Q-Tel, the agency's investment arm. It took part in a $10 million round of financing for 3VR, a 25-employee company led by former executives at TiVo and Inktomi, an Internet distribution company"
"But Bruce Schneier, a security expert and the founder of Counterpane Internet Security, in Mountain View, California, questioned the real purpose of systems like 3VR's. "These things aren't designed to catch the bad guys," Schneier said. "They're for watching the good and the stupid. The bad guys, they'll just wear a hat and sunglasses the day that they want to avoid the camera." (Russell of 3VR says that his software can see through some disguises"
"To Schneier, the camera networks are part of a larger trend - along with Britain's plans to monitor every car on every major road, and the National Security Agency's eavesdropping program in the United States - toward "wholesale surveillance, the kind of stuff Stalin only dreamed of," he said"
Cool tools : loosing our Privacy
"While you were IM'ing a friend about what Santa brought, downloading Mariah to your iPod and snapping pictures of the kids playing Xbox on your new walkie-talkie cell phone, Big Brother stopped by.
He rummaged through your hard drive and found your credit card number (the one you used for the Xbox 360 game). He took a peek at the Web sites you've visited (naughty, naughty).
And he jotted down your e-mail password (who in the world is RedHotMama?).
The highest toll on the information superhighway is our privacy, it seems
Or are we, as the late social critic Neil Postman fretted, amusing ourselves to death?
The shocking thing in all these examples is not the technology itself but how quiescent we've been in accepting intrusion. Even the idea of a spychip has lost its power to unnerve.
Much more is at stake than the security of a credit card or an eBay account; it's our freedom draining away. As Justice Louis Brandeis warned as early as 1928, when he famously dissented on the use of wiretaps to convict bootlegger Roy Olmstead,
"Discovery and invention have made it possible for the government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet."
But buck up, it's a new year. Go over to that PC, delete those cookies, erase that cache, clear credit card numbers from forms, remove health-related info, run those anti-virus programs."
ALL entry-ports controlled ( US-Visit)
( or should it say "all exits" )
Every port of entry into the United States - land, sea or air - is now equipped with the system, US-Visit, which takes fingerprints and digital photos of many entering foreigners to check them against criminal and terrorist watch lists. The 115 U.S. airports with international traffic, as well as 15 sea and 154 land ports of entry, all now have the equipment, which is linked to a national computer network that in a matter of seconds can check a visitor's fingerprints against a database of known terrorists and criminals
Don't Fence Me In ... Hemmed in on ALL sides ( land and sea )
1. "Athena" port-control by Raytheon
Maritime Domain Awareness System ( C 4 ISR )
2. Mexican Border closing
Dec. 15 - House Republicans voted on Thursday night to toughen a border security bill by requiring the Department of Homeland Security to build five fences along 698 miles of the United States border with Mexico to block the flow of illegal immigrants and drugs into this country.
But the vote was sharply assailed by Democrats, who compared the fences to the Berlin Wall in Germany. Twelve Republicans also voted against the amendment.
3. Canadian and Mexican Border Closings
The U.S. House of Representatives voted late Thursday to consider erecting "physical barriers" along the American border with Canada, the firmest step yet toward building the kinds of fences now in place on the Mexican frontier to stop the northward flow of illegal aliens and smuggled goods.
The motion cleared the way for about 1,100 kilometres of new fencing along the U.S.-Mexico border in Texas, New Mexico, Arizona and California, but also urged the agency to "conduct a study on the use of physical barriers along the northern border
Sponsored by Rep. Duncan Hunter, a California Republican who has long championed fences and walls to halt illegal crossings in the southwestern U.S., the plan to shore up America's borders passed by a vote of 260-159 on Thursday but was strongly denounced by some Democrats as a "Berlin Wall" for North America
Rep. James Sensenbrenner of Wisconsin, one of the strongest proponents of the immigration bill and a backer of the Hunter amendment,
Last month, U.S. Homeland Security Secretary Michael Chertoff announced a secure-border initiative that provided for increased use of unmanned "drone" aircraft, infrared cameras and other high-tech surveillance measures, as well as increased staffing, to patrol the Mexican and Canadian borders
Even before passage of Hunter's proposal, Mexican President Vincente Fox had denounced border fencing as a "disgraceful and shameful" initiative that violates human rights and does nothing for the U.S. economy.
Live Scan electronically sends fingerprint to DoJ for security clearance
Dept. of Justice .. pre-registration required ( 3 days .... 72 hours advance time)
THE LIVE SCAN PROCESS IS REPLACING FINGERPRINT CARDS. Live Scan technology electronically transmits fingerprints directly to the Department of Justice (DOJ) and reduces delays with processing hardcopy cards. Live scan fingerprints that result in clearances are now transmitted electronically to the ATCS registry, usually within 72 hours
DOJ fingerprint results are sent to the Aide and Technician Certification Section (ATCS) for certification as a nurse assistant or home health aide. DOJ also send fingerprint results to ATCS for certain employees of Intermediate Care Facilities for the Developmentally Disabled, Adult Day Health Care facilities, and Home Health Agencies.
Workforce Central : Employee fingerprints
Fuel pump manufacturer Tokheim has introduced a fingerprint scanner to monitor the working hours of its employees and integrate the results directly into its payroll and HR system.
This month the company will finish installing Kronos Systems' Workforce Central to monitor and manage attendance at its Dundee manufacturing site
The system will enable Tokheim's supervisors to deal with absence or lateness immediately, and management will gain data analytics tools. "With staff located across a large area it is essential that supervisors know when production might be affected by staff shortages," it said
The Paris-based European Space Agency plans to launch a second test satellite, Giove B, before sending
a total of 30 satellites into orbit to run the system, which could begin commercial [ Ed : $ ] operations
as soon as 2008. Galileo's developers say it is designed for civilian rather than military use. It will offer more precise data than the U.S. system, allowing users to navigate to the nearest meter, or 3.3 feet, rather than the nearest five meters, now the standard in GPS technology
China and Israel contributing financing to Galileo, and with European governments aiming to develop technology that is more accurate and reliable than the current U.S. system
The primary contractors on the E3.8 billion, or $4.5 billion, project are European aerospace giant EADS, Thales and Alcatel of France, Inmarsat of Britain, the Italian contractor Finmeccanica and the Spanish companies AENA and Hispasat
Now you can be arrested for anything
Today there ( England) ; tomorrow here ( America and anywhere )
"Here, there and everywhere " ubiquitous
"Police are to be given sweeping powers to arrest people for every offence, including dropping litter, failure to wear a seat belt and other minor misdemeanours.
The measures, which come into force on Jan 1, are the biggest expansion in decades of police powers to deprive people of their liberty.
At present, officers can generally arrest people if they suspect them of committing an offence which carries at least five years in prison. They will now have the discretion to detain [ Ed : "detainees" ] someone if they suspect any offence and think that an arrest is "necessary
Galileo and Satellite-navigation ( sat-nat) of cars - ( PHOTOS )
What is Echelon ?
You can run but you cannot hide
Big Brother Surveillance continued Page five
I Have Decided to
Song : http://ingeb.org/spiritua/ihavedec.html