Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, May 25, 2011

10 ways ‘the police state’ tracks you

When discussing the “promotion of a police state” in music videos, I am not referring to an abstract, theoretical concept. It is real and it is happening. The high-tech chips and devices seen a few years ago in sci-fi movies and futuristic music videos are used on us today. Here’s an article from Activist Post describing 10 ways the police state keeps track of you.
The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry, which now seems to be becoming a war on “liberty and privacy.” Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot.

High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:

GPS — Global positioning chips are now appearing in everything from U.S. passports and cell phones to cars. More common uses include tracking employees, and for all forms of private investigation. Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.
Internet — Internet browsers are recording your every move forming detailed cookies on your activities. The National Security Administration has been exposed as having cookies on their site that don’t expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide no privacy to users while technologies advance for real-time social network monitoring is already being used. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple’s iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cybersurveillance by citizens.
RFID — Forget your credit cards which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your Social Security number. Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more. RFID “proximity cards” take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access. Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless — perhaps including tracking hard currency so we can’t even keep cash undetected. (Also see microchips below).

Traffic cameras — License plate recognition has been used to remotely automate duties of the traffic police in the United States, but have been proven to have dual use in England such as to mark activists under the Terrorism Act. Perhaps the most common use will be to raise money and shore up budget deficits via traffic violations, but uses may descend to such “Big Brother” tactics as monitors telling pedestrians not to litter as talking cameras already do in the UK.

Computer cameras and microphones — The fact that laptops — contributed by taxpayers — spied on public school children (at home) is outrageous. Years ago Google began officially to use computer “audio fingerprinting” for advertising uses. They have admitted to working with the NSA, the premier surveillance network in the world. Private communications companies already have been exposed routing communications to the NSA. Now, keyword tools — typed and spoken — link to the global security matrix.
Public sound surveillance — This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous “keywords.” This technology has been launched in Europe to “monitor conversations” to detect “verbal aggression” in public places. Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.

Biometrics — The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in national identification cards.

DNA — Blood from babies has been taken for all people under the age of 38. In England, DNA was sent to secret databases from routine heel prick tests. Several reports have revealed covert Pentagon databases of DNA for “terrorists” and now DNA from all American citizens is databased. Digital DNA is now being used as well to combat hackers.

Microchips — Microsoft’s HealthVault and VeriMed partnership is to create RFID implantable microchips. Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future. The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.
Facial recognition — Anonymity in public is over. Admittedly used at President Obama’s campaign events, sporting events, and most recently at the G8/G20 protests in Canada. This technology is also harvesting data from Facebook images and surely will be tied into the street “traffic” cameras.
All of this is leading to Predictive Behavior Technology — It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling. It’s been marketed for such uses as blocking hackers. Things seem to have advanced to a point where a truly scientific Orwellian world is at hand. It is estimated that computers know to a 93 percent accuracy where you will be, before you make your first move. Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.

Many of us are asking: What would someone do with all of this information to keep us tracked, traced, and databased? It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.

Article by: Vigilant Citizen

Tuesday, May 10, 2011

iPhone 4 Could Be Tracking Your Movements



iPhones 4 devices have been found to secretly track their owners movements and to record them on the phone. This data can then be traced on a map. How come this “feature” was never divulged or advertised? More Big Brother tactics.

Apple iPhones and 3G iPads are secretly recording and storing details of all their owners’ movements, researchers claim.

Location data is kept in a hidden, unencrypted file according to security experts Alasdair Allan and Pete Warden.

With the right software, it can be used to map exactly where a person has been.

Apple has yet to comment on the revelation, however there in no suggestion that it has been uploading or using the information.

The findings, first reported by the Guardian newspaper, will come as a surprise to most iPhone users, as their devices do not give any visual indication that such data is being recorded.

However, although the practice is not explicitly flagged-up, it appears to be covered in the company’s terms of use.

“We may collect information such as occupation, language, zip code, area code, unique device identifier, location, and the time zone where an Apple product is used so that we can better understand customer behaviour and improve our products, services, and advertising”

Clearly intentional

Writing on the technology website O’Reilly Radar, Mr Allan and Mr Warden said they did not know why iPhones and iPads were collecting location information but it was “clearly intentional”.

The men claim that the facility to record users’ positions was added with the iOS4 software update, released in June 2010.

The data is also transferred to the owner’s computer and stored in a file there each time the two devices are connected to carry-out a backup or synchronisation.

Graham Cluley, senior technology consultant at security firm Sophos, told BBC News that it was unlikely Apple planned to use the information for commercial purposes.

“I think there are some legitimate privacy concerns and people will probably look for a way of obscuring that data,” he said.

“But it is an object lesson about reading the terms and conditions,” he added.

- Source

Sunday, March 14, 2010

Sitting at YVR

Well, once again waiting in the lounge at YVR heading back to JFK. The last time I was here was in January just after Captain Underwear was foiled while attempting his dastardly deeds. Security was tight back then, very tight. The only thing missing in January, aside from no carry-on, was a strip search to accompany the very physical pat-down. But here we are, again, at YVR. I asked at check-in if I had to surrender my small carry-on back. They said no, "no problem" was the response. I approached security not knowing really what to expect. Nothing, nothing was what I got. Disappointed, well yes, I had built up expectations, expectations that I believed were valid, rational and based on prior experience combined with mass media news hysteria - mostly American. Was I wrong to have these feelings and expectations of intensified security and scrutiny? Well, apparently the neurosis is all mine! I was whisked through security quite quickly, there was no line. My bag, which really wasn't that small, seemed to fly through the screening machine and arrived on the other side before me - no double pass, no prolonged examination of the contents on the screen which even the addled traveler can catch a glimpse of. What happened, what did happen? Whatever happened, I don't know! I don't know what it meant when they had the news coverage day and night of the Underwear Bomber. I don't know what the different security agencies were talking about and announcing as official statement after the event. And, I realize now that I don't care and don't want to hear about it anymore. I grew up with the Three Stooges and the Marx Brothers. Back then we new it was make believe but I think now a days people can't make those distinctions as easily as they could in the past.

What I would like is that the burden of security be placed on the backs of the security agencies and not on the travelers. If those security agencies can't figure out what they are doing, what tone they are setting, and what instructions they are giving to us, then how are we supposed to know?
 

Whey abHa yUL wOt LoNG MONto Copyright © 2010 | Designed by: Compartidisimo