Showing posts with label Surveillance and Datamining. Show all posts
Showing posts with label Surveillance and Datamining. Show all posts

10.27.2013

Black Box Mandate Will Let Gov't Track, Tax, and Remotely Control All Vehicles

Federal government planning black box vehicle mandate to track, tax and even remotely control all personal vehicles

(NaturalNews) The federal government is working on a plan that would mandate black box tracking devices be installed in every vehicle, with real-time uploading of vehicle location, speed and mileage to government authorities. This Orwellian technology is already technically feasible and will be promoted as a way to increase "highway safety" while boosting government revenues from mileage taxation.

"The devices, which track every mile a motorist drives and transmit that information to bureaucrats, are at the center of a controversial attempt in Washington and state planning offices to overhaul the outdated system for funding America's major roads," reports the LA Times.

"[Congress is] exploring how, over the next decade, they can move to a system in which drivers pay per mile of road they roll over. Thousands of motorists have already taken the black boxes, some of which have GPS monitoring, for a test drive."

There are three hugely important realizations to glean from all this:

Read more:

http://www.naturalnews.com/042690_vehicle_black_boxes_mileage_taxes_remote_control.html

8.30.2013

Supermarket of The Beast, Sponsored by IBM




The mark of the beast is the sign of the Antichrist, and is mentioned in Revelation 13:15-18:
The second beast was given power to give breath to the image of the first beast, so that the image could speak and cause all who refused to worship the image to be killed. It also forced all people, great and small, rich and poor, free and slave, to receive a mark on their right hands or on their foreheads, so that they could not buy or sell unless they had the mark, which is the name of the beast or the number of its name.

This calls for wisdom. Let the person who has insight calculate the number of the beast, for it is the number of a man. That number is 666.

Also see:

Take the Mark of The Beast or Don't Eat

And let's make sure your Obamacare is valid.

Bonus video:








8.26.2013

'Mail Online' False-Flag Chemicak Attack Article Vanishes


In January 29, 2013, Britain’s most popular Daily Newspaper, in its online version Dailymail.co.uk published an article titled:

U.S. ‘backed plan to launch chemical weapon attack on Syria and blame it on Assad’s regime’

A few days later they pulled the article.

What the reason was for the deletion remains unclear. The article was published at this URL:
dailymail.co.uk/news/article-2270219/U-S-planned-launch-chemical-weapon-attack-Syria-blame-Assad.html

There exists a cached version of the article which can be found here:

http://web.archive.org/web/20130129213824/http://www.dailymail.co.uk/news/article-2270219/U-S-planned-launch-chemical-weapon-attack-Syria-blame-Assad.html

See scan of complete deleted article below:

One day later, on January 30, a moderated news board thread was created, which is still online, at Mail Online about that article. Thread: Syrian WMD False Flag – Are False Flags a way of life now?

In their initial article Mail Online refers to an Infowars.com article (dated January 28, 2013), that’s where they probably found the information on the leaked e-mail and other documents.

CapitalBay  (who published the wrong areal pictures of the school in Sandy Hook), Mail Online, Infowars, Yahoo News India, News Track India, Whale.to, Philippine Times, Uganda News, LiveLeak, Truth Media TV and others all claim in their mirrored articles that the alleged e-mail from Britam’s David Goulding to Philip Doughty was dated December 25, 2012.

However, at Neftegaz.ru (translated with Google) there also exists another version of the alleged e-mail. There the e-mail is dated December 24, 2012.

Whether the content of the alleged e-mail is correct, that’s open for debate. Fact is that PressTV has an article online which supports the claims in the alleged e-mail. And RT‘s article from last year (June 10, 2012) still claims that “Syrian rebels aim to use chemical weapons,” to then blame Assad for it. Those weapons came from Libya, according to RT. This begs the question: Did Christopher Stevens know about those weapons when he died in the CIA villa in Benghazi last year?

But why was the article pulled by Mail Online?

Why do there exist at least 2 versions of the same alleged e-mail?

And what about Britam admitting that they were hacked, according to Ruvr.co.uk (The Voice of Russia)?
But there’s also this, according to Mail Online it was a Malaysian hacker who got to the alleged e-mail(s), while Infowars claims that the e-mail was “obtained by a hacker in Germany.”

Either way, whoever initiated the Britam e-mail escapade did a good job at fooling both mainstream and alternative news outlets because it’s a real mess and few know what really happened and why.

Yet it’s ironic that Mail Online did not delete their other article where they wrote about the UN’s Carla Del Ponte who claims that Syrian rebels are responsible for “sarin gas attacks, which had been blamed on Assad’s troops.” The same rebels who now receive resources from the EU and the U.S., since the EU is buying oil from those “rebels” and the US is arming them for a proxy war as the Washington Post describes it.

Earlier it was reported that Israel had granted oil exploration rights inside Syria, in the occupied Golan Heights, to Genie Energy who’s shareholders include Rupert Murdoch and Lord Jacob Rothschild.
See http://www.craigmurray.org.uk/archives/2013/02/israel-grants-oil-rights-in-syria-to-murdoch-and-rothschild/





The preceding has been provided by: Global Research

Also see:

Hacked Documents Show Plan For US-Backed False-Flag Chemical Attack in Syria



8.11.2013

Warrantless Search of Texas Apartment Complex

For any patriot adherent of the United States Constitution, this image will stand as a chilling testament to the reality of the police state we now live in. I am surprised that Texans, of all people, would stand for this crap.


Not only is this search being conducted without a warrant, but they may enter your residence randomly even if you are not at home.



7.05.2013

6 Sneaky Ways Surveillance Changes How You Think

The following article is presented in full for a point of reference, but is not meant as an alternative to the original source. Please visit the original source through the hyperlinked article title just below.

6 Insidious Ways Surveillance Changes the Way We Think and Act

Like it or not, we’re being transformed as citizens, neighbors and human beings.

When I moved to a Czech village in 1994 to teach English, I was fascinated by the cultural difference between Americans like me and my new community. At that time, the oppressive memory of the dreaded Communist secret police, the StB, was still fresh. (Check out a haunting series of street photos snapped by agents in their heyday.) As a brash young ex-pat, born after the era of McCarthy and J. Edgar Hoover, I understood little of what it felt like to live under constant surveillance.

The Czechs knew better. Several decades under the watchful eyes of the StB (and before that, the spies of the Habsburg Empire) had molded their attitudes and behavior in ways that were both subtle and profound. They were on their guard with newcomers. When you got to know them, you might sense a tendency toward fatalism about the future. Signature Czech traits included a sophisticated gallows humor and a sharp sense of the absurd, honed by a lifetime of experiencing Kafka-esque political conditions (Kafka himself was a Czech).

Then there was that subversive streak. When you gained their trust, Czechs would often gleefully show you their old smuggled rock-and-roll records or describe a forbidden radio set up in some corner of the house. These proud tales of rebellious triumph over the StB were cast against stories of horror, like a student who told me of the day her daddy disappeared after “talking to the oven” where a radio was hidden. For most Czechs, the salient lesson of the police state was an us-against-them mentality. Only sometimes you didn’t know who “they” were.

1994 was the very beginning of the Information Age, and it has turned out rather differently than many expected. Instead of information made available for us, the key feature seems to be information collected about us. Rather of granting us anonymity and privacy with which to explore a world of facts and data, our own data is relentlessly and continually collected and monitored. The wondrous things that were supposed to make our lives easier—mobile devices, gmail, Skype, GPS, and Facebook—have become tools to track us, for whatever purposes the trackers decide. We have been happily shopping for the bars to our own prisons, one product at at time.

Researchers have long known that there are serious psychological consequences to being surveilled, and you can be sure that it's changing us, both as a society and as individuals. It’s throwing us off balance, heightening some characteristics and inhibiting others, and tailoring our behavior sometimes to show what the watcher wants to see, and other times to actively rebel against a condition that feels intrusive and disempowering.
If you think about it, “ Prism” is the perfect name for a secret program of extensive watching that will shift our perspective and potentially fracture our view of each other and of ourselves as citizens. Public opinion is now sorting itself out, and we don’t yet know how Americans will come to feel about the new revelations of spying on the part of the government, private contractors, and their enablers. But whether we like it or not, surveillance is now a factor in how we think and act. Here are some of the things that can happen when watching becomes the norm, a little map to the surveillance road ahead.

1. Shifting power dynamics: When an NSA agent sorts through our personal data, he makes judgments about us—what category to place us in, how to interpret and predict our behavior. He can manipulate, manage and influence us in ways we don’t even notice. He gains opportunities for discrimination, coercion and selective enforcement of laws. Because the analysis of megadata results in a high number of false positives, he may target us even if our activities are perfectly blameless from his perspective.

As Michel Foucault and other social theorists have realized, the watcher/watched scenario is chiefly about power. It amplifies and exaggerates the sense of power in the person doing the watching, and on the flip side, enhances the sense of powerlessness in the watched. Foucault knew that knowledge is linked to power in insidious ways. Each time the watcher observes, she gains new knowledge about the watched, and correspondingly increases her power. That power is then used to shape reality, and the watcher’s knowledge becomes “truth.” Other perspectives are delegitimized, or worse, criminalized.

2. Criminal activity: Every apologist for the surveillance state will make the claim that spying on citizens protects us from things like terrorism, crime and violence. That may indeed be true. What is also true is that surveillance can be used just as easily to commit a crime as to prevent it. History shows us ample cases of governments, including our own, using surveillance to turn upon their own people in unlawful ways, in some cases launching attacks that are just as devastating as those feared from outsiders.

Surveillance also turns citizens into criminals, either by distorting laws to criminalize behavior which was once considered lawful, or in breeding hostility and rebellion on the part of the populace which can lead to crime.

Today’s private contractors also have incentives to use surveillance to commit crimes outside of any political agenda. How about a little insider trading? How about stealing business ideas? How about using collected data to sexually prey upon others? To blackmail for any purpose imaginable? To sell our information to the highest bidder? For every Snowden who balks at the use of data collected for surveillance, you can bet there are two other contractors using it to enrich or empower themselves. Unlike elected officials, there is no way for us to even attempt to make them accountable.


3. Diminished citizenship: In his article, “The Dangers of Surveillance,” Neil M. Richards warns that state scrutiny can chill the exercise of our civil liberties and inhibit us from experimenting with “new, controversial, or deviant ideas.” Intellectual privacy, he argues, is key to a free society. Surveillance protects the status quo and serves as a brake on change.

We’ve begun to see this in the places where we expect intellectual freedom to be most strongly protected. Recently, Harvard University administrators were found to be spying on the email accounts of 16 deans while trying to find the source of a media leak, an action which curtails cherished academic freedom. The U.S. government was outed as spying on journalists at the Associated Press, behavior which dampens reporters’ enthusiasm for investigating the government’s secrets and analyzing its actions.

When intellectual privacy, freedom of speech, and freedom of the press are restricted through surveillance, powerful ideas about truth, values, and how we live are increasingly imposed from the top down, rather than generated by citizens from the bottom up. When Big Brother is watching, Big Brother decides what's best for us. Citizens become apathetic, disengaged, and worst of all, feel a loss of dignity in their very status as citizens.

4. Suspicious minds: Surveillance makes everyone seem suspicous. The watched become instilled with an air of criminality, and eventually begin to feel culpable. Psychological researchers have found that surveillance tends to create perceptions and expectations of dishonesty.

The growing mutual distrust between the watcher and wathed leads to hostility and paranoia. One of the key features of Jeremy Bentham’s Panopticon was the notion that the inmates of an institution based on his design, such as a prison, would never be able to tell whether they were being watched or not, creating a heightened sense of unease. The tradition of secret police operatives and informants blending in with citizens prevents the watched from knowing the identity of the watcher, as does the distance of technology firms and government entities spying through computers and communication devices. All of these can breed an unhealthy social atmosphere as well as an individual sense of discomfort and suspicion. 

5. Divided society: In his book, Brain on Fire, Tim McCormacks discusses the class divisions that tend to rise between the watcher and the watched. Rights, privileges and power become distributed according to who has the most access to observation. The watcher groups categorizes people based on who most arouses suspicion, which may be based on various prejudices or political agendas.
A watcher class may emerge which protects its interests by more watching, and more punishing and control of the watched. It increasingly wields power over technology, financial and legal systems, the political realms, and military capabilities. Those who hold power may become invisible to all but a few insiders, a nightmare scenario Orwell imagined in 1984. (Maybe that’s why sales of Orwell’s book have skyrocketed in the wake of revelations about Prism).

6. Unhappiness: Finallly, though you will not hear many pundits talking about it, surveillance tends to make us unhappy. Bentham's Panopticon was designed to inflict pain on a few (those in prison) for the sake of the happiness of the many in the community. But when everyone is being watched, everyone is experiencing pain, even, perhaps, the watcher. The brilliant  German film " The Lives of Others" depicts the mental anguish of an agent of the East German secret police as he spies on his neighbors.

Some kind os surveillance may make us feel happier, at least initially.  The presence of cameras on the street, for example, may give us a comforting sense of security (even though the cameras may actually be doing nothing to stop crime). But when we discover that we are being watched in ways we never imagined, for purposes we can hardly fathom, our happiness decreases. Bosses reading our email, technology firms tracking our Internet searches, and government agencies monitoring our communications for secret purposes makes us feel anxious and resentful. Systematic surveillance may squelch our creativity as we are managed to become more conformist. We come to distrust each other and our sense of unfairness rises.

The goal of using surveillance to produce a happy and stable state may well beget, perversely, the opposite: a society of edgy, unhappy beings whose sense of themselves is chronically diminished. Not exactly a recipe for Utopia.




6.21.2013

Man Arrested For Filming NYPD

Shawn Randall Thomas, 47, was arrested and charged on two counts of disorderly conduct after police observed him photographing and videotaping the Brooklyn housing police sub-station in Bushwick over the course of an hour's time. The charges against him allege that he used obscene language and that he blocked the driveway to the police station. Thomas has subsequently filed a complaint with Brooklyn District Attorney's Civil Rights Bureau claiming he was harassed by an officer.


This sort of situation is a delicate one, that stands on the front line of the debate between freedom and security in modern America.

On the one hand, we have a photographer exercising his rights as an American to film as he pleases in a public area. In this instance, the man claims to be filming in order to prepare for another court case stemming from an earlier arrest. Others might say he was clearly trying to annoy the police, and to make a political statement with his actions. Nevertheless, he was not breaking any law.

Even the disorderly conduct charges against him have no merit. He did not actually block traffic in any way, as you can clearly see in the video. He was not "blocking" the driveway any more than a woman with a baby carriage would walking down the sidewalk. He did not impede the flow of traffic, even if he did repeatedly cross back and forth across the entrance. As far as the language goes, it's almost laughable that such a law is even on the books. But even if he did drop a few curse words after police attacked him, it is hardly the same as screaming obscenities over a loudspeaker to disturb the general public by offending children and little old ladies. I am sure I would not have to do much digging at all to pull out some videos of police saying some pretty nasty things to people.

On the other hand, the supposed police officer (in plain clothes refusing to properly identify himself) was within his rights to approach the photographer, to ask questions, and even to maintain an "uncomfortable" level of surveillance on him. Up to that point, the actions by police were no more harassment than the actions of the photographer. Police have as much right as any civilian to go where they please, and to talk to whoever they please. Of course, a civilian is under no obligation to engage in conversation or to answer questions, but the police there were not forcing him to either.

But then we see the arrest go down. We have already established that the arrest was without merit, and therefore now becomes a clear case of harassment by police against a photographer.  Harassment by way of assault and kidnapping.

Let's also keep in mind here that the NYPD operates the most pervasive video and electronic surveillance program in the country. They can spy on citizens all day every day, but don't like it so much when the cameras are turned back on them it seems.

Read more about this case at:

Photography Is Not a Crime

DNAinfo New York

Also see:

An Inside Look at NYPD's 'Stop and Frisk' Policy (VIDEO)






6.10.2013

Enemy of The State (FULL MOVIE)

With the recent revelation that the NSA is watching and storing virtually all digital communication in America, this is my movie pic of the day.

You can watch a preview of this movie, Enemy of the State by clicking that link. The following embed is the full movie presented in 1080p HD.


"It's not paranoia, if they're really after you."





5.17.2013

Do These Images Reveal The Real Boston Bombers?

While the FBI claims to have video of the Tsarnev brothers actually placing the bombs, no such video has yet been made public. From the start, the media has tried to convince us that just because the brothers were caught on a store surveillance camera wearing backpacks, that they must be the bombers. Of course, that means we must also ignore the dozens of other people caught on camera that day wearing backpacks and carrying bags.

People like this guy, who we see here carrying a bag very similar to one that we later saw exploded.  

(There was also an image of him not carrying the bag later, as if he had left it somewhere. But it appears that image has now been scrubbed from the internet. If anyone has a copy, please email me or drop it in a comment in the DISQUS box.)

Some reports indicate that this guy was cleared by the FBI after questioning.

From these images, we can clearly see what is believed to be one of the two bombs. Although the focus has been on backpacks all along, this looks more like a bag of some sort, than a regular backpack.



So do we have any images of the suspected brothers near there, or better yet, actually placing that bag? No. What we have are images of two women placing the bag there, in two parts, while an older man watches from behind.


While these images too might just be "coincidence" it is far more compelling evidence than seeing the suspect brothers simply walking around wearing backpacks. Before they were singled out, dozens, if not hundreds of people carrying bags were scrutinized in images plastered up all over the internet.

It is also interesting to note, that within minutes of the bombing, the FBI were destroying evidence.

Boston Bombing Witness Says FBI Deleted His Crime Scene Photos




2.09.2013

America's Own Iron Curtain: DHS Suspends Constitution at Borders

Imagine for a moment, that the old Soviet Union were buttressed right up against the United States, where Canada or Mexico are. Now imagine which side of that border would scare you more. Which side the more oppressive police-state, where rights and liberty do not exist? Sadly, more and more each and every day the United States is becoming every terrible thing we ever imagined or were ever told about what laid beyond the old communist Iron Curtain. Are we in the land of the free? Hardly.

Warrantless strip-searches of children by the TSA's agents at airports, that corrupt agency's expansion of power outside of airports, highway checkpoints, alarming scandals within the DHS hidden from the public, helicopters swooping down from the sky to molest innocent people who are just out for a walk, class warfare as the government seizes bodily fluids of the poor without a warrant, and a frightening level of public support for all of this.

What sort of freedom is this? What sort of nation greets visitors and citizens alike with direct violations of the very values it preaches to the rest of the world? Where has the 4th Amendment gone? Where is the America where I was born?

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." ~Amendment IV, Constitution for the United States of America



That was in 2009. This is now:

Not only has the government declared our borders a "Constitution-free Zone" but now also claims that zone extends 100 miles inland from the borders. This move declares that virtually the entire northeast is now under martial law.



DHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along Border

The Department of Homeland Security’s civil rights watchdog has concluded that travelers along the nation’s borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security.

The DHS, which secures the nation’s border, in 2009 announced that it would conduct a “Civil Liberties Impact Assessment” of its suspicionless search-and-seizure policy pertaining to electronic devices “within 120 days.” More than three years later, the DHS office of Civil Rights and Civil Liberties published a two-page executive summary of its findings.

“We also conclude that imposing a requirement that officers have reasonable suspicion in order to conduct a border search of an electronic device would be operationally harmful without concomitant civil rights/civil liberties benefits,” the executive summary said.

The memo highlights the friction between today’s reality that electronic devices have become virtual extensions of ourselves housing everything from e-mail to instant-message chats to photos and our papers and effects — juxtaposed against the government’s stated quest for national security.
The President George W. Bush administration first announced the suspicionless, electronics search rules in 2008. The President Barack Obama administration followed up with virtually the same rules a year later. Between 2008 and 2010, 6,500 persons had their electronic devices searched along the U.S. border, according to DHS data.

According to legal precedent, the Fourth Amendment — the right to be free from unreasonable searches and seizures — does not apply along the border. By the way, the government contends the Fourth-Amendment-Free Zone stretches 100 miles inland from the nation’s actual border.

Civil rights groups like the American Civil Liberties Union suggest that “reasonable suspicion” should be the rule, at a minimum, despite that being a lower standard than required by the Fourth Amendment.

“There should be a reasonable, articulate reason why the search of our electronic devices could lead to evidence of a crime,” Catherine Crump, an ACLU staff attorney, said in a telephone interview. “That’s a low threshold.”

The DHS watchdog’s conclusion isn’t surprising, as the DHS is taking that position in litigation in which the ACLU is challenging the suspicionless, electronic-device searches and seizures along the nation’s borders. But that conclusion nevertheless is alarming considering it came from the DHS civil rights watchdog, which maintains its mission is “promoting respect for civil rights and civil liberties.”

“This is a civil liberties watchdog office. If it is doing its job property, it is supposed to objectively evaluate. It has the power to recommend safeguards to safeguard Americans’ rights,” Crump said. “The office has not done that and the public has the right to know why.”

Toward that goal, the ACLU on Friday filed a Freedom of Information Act request demanding to see the full report that the executive summary discusses.

Meantime, a lawsuit the ACLU brought on the issue concerns a New York man whose laptop was seized along the Canadian border in 2010 and returned 11 days later after his attorney complained.

At an Amtrak inspection point, Pascal Abidor showed his U.S. passport to a federal agent. He was ordered to move to the cafe car, where they removed his laptop from his luggage and “ordered Mr. Abidor to enter his password,” according to the lawsuit.

Agents asked him about pictures they found on his laptop, which included Hamas and Hezbollah rallies. He explained that he was earning a doctoral degree at a Canadian university on the topic of the modern history of Shiites in Lebanon.

He was handcuffed and then jailed for three hours while the authorities looked through his computer while numerous agents questioned him, according to the suit, which is pending in New York federal court.

Also check out:

Homeland Insecurity - Rise of Global Police State (Full-Length Feature Film)



1.28.2013

Hacked Documents Show Plan For US-Backed False-Flag Chemical Attack in Syria

Several days ago British defence contractor Britam came under cyber attack and went offline. A hacker going by the handle "JAsIrX" has uploaded a cache of documents stolen in the attack, and they are now being circulated online.

The documents are considered to confidential and secret, but at first glance appear to be rather mundane. Reports of employees getting in trouble for being drunk, passport information, things that might rightly be considered confidential but nothing particularly newsworthy.

But there is a very serious exception.

One uncovered document shows plans for what is known as a false-flag attack. That is, to make a military strike under the guise of being someone else.

In this case, Qatar is making an offer to the British contractor to participate in and help orchestrate a false flag attack in Syria using chemical weapons. The document states that the operation has the backing of the United States. The plan is/was to have the contractor deliver a chemical weapon to Homs, Syria. The weapon itself to be acquired from Libya so that it would be the same Russian-make and therefore the same sort that Assad would be expected to have in his own arsenal. Ukranian mercenaries under contract with Britam already, would then be used to actually carry out and document the attack, speaking Russian, and giving the appearance of being Russian military.

Specifically, one email reads:

Phil
We've got a new offer. It's about Syria again. Qataris propose an attractive deal and swear that the idea is approved by Washington. 
We'll have to deliver a CW to Homs, a Soviet origin g-shell from Libya similar to those that Assad should have. They want us to deploy our Ukrainian personnel that should speak Russian and make a video record.

Frankly, I don't think it's a good idea but the sums proposed are enormous. Your opinion?
Kind regards
David

Here is a screenshot of the actual email, click to enlarge.


For more technical data including the full cache of documents, please visit:

Cyber War News

For a more detailed article related to this information visit:

Land Destroyer Report


12.04.2012

Help Facebook Spy On You With New App

I don't think folks really realize how this sort of information can be exploited, not only by corporations or the government, but even by your own friends (or enemies). Even with certain privacy settings (which are not at all reliable on Facebook) many people are not careful at all about the information and pictures they share. Nor do most folks understand how seemingly trivial information can be used against them by potential employers, law-enforcement, jaded spouses, etc.

One example that always comes to mind for me, was the app which updates your location. Two friends of mine, a brother and a sister share an apartment together. They had just purchased a large flat screen TV and a high-end computer system. A few weeks later, they were at the mall together, shopping for more components for their ultimate entertainment system. The location app automatically updated their location on each of their Facebook accounts, showing that they were both at the local galleria mall. When they came home, they found all of their new hardware gone! More than likely, they were burglarized by someone on their very own Facebook friends list, who saw that there was no one home at the apartment.

Photographic information can be even more damaging, with high levels of technical as well as visual data that can be exploited in ways you never imagined.



Facebook accused of massive 'data grab' with new service that automatically uploads your phone pictures

  • Photo Sync being aggressively promoted to Facebook's mobile app users 
  • It will upload every single picture taken to the social network's servers Facebook will benefit from huge windfall of data it can commercialise 
  • It could use that data to build detailed database of users' lives

Facebook has been accused of a massive 'data grab' after encouraging users to allow it to automatically synchronise photos from their mobile devices to the social networks servers.

The social network from Friday began asking users of its mobile apps to activate its new Photo Sync, which will automatically upload each picture to a private album. Whether or not users decide share the photos on their public newsfeed, Facebook itself will still have access. 

That means it will be able to mine those files for their metadata, including the location where the photo was taken, as well as use its facial recognition technology to spot those pictured. As a result, over time, Facebook will be able to build up a comprehensive database of where users have been, and with whom, from information they automatically give to the company. 

Emma Carr, deputy director of civil liberties campaign group Big Brother Watch, said: 'This provides a stark warning about the loss of control experienced once you have installed an application to your mobile phone. 

'Privacy is clearly at the very back of the Facebook's mind when creating an application that enables this kind of uploading of photographs to be easier when it, in fact, it should be made more difficult.' 

Read more: http://www.dailymail.co.uk/sciencetech/article-2242255/Facebook-accused-massive-data-grab-new-service-automatically-uploads-phone-pictures.html#ixzz2E6gpdnENFollow us: @MailOnline on Twitter | DailyMail on Facebook


9.24.2012

US Court Rules Paying Cash is Probable Cause for Detainment

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." ~Amendment IV, U.S. Constitution


The dispute in this case stems from a suit filed by motorists who were detained after paying with cash on Florida toll highways. While the details may leave one with the impression that this is "no big deal," it is important to understand that this ruling by the US Court of Appeals has far-reaching implications and virtually nullifies the 4th Amendment.

This lawsuit, filed last year by a family of motorists and on behalf of all freedom-loving motorists, claimed that they were effectively held hostage by the Florida Department of Transportation (FDOT) and private contractor Fanueil, Inc. after paying their toll in cash. According to FDOT policy in place at the time, motorists were randomly detained for paying in "large denomination bill" as small as $5. Toll collectors would not let the motorist proceed until a "Bill Detection Report"  was completed, recording information about the vehicle and personal information from the motorist's Driver License.

Some have claimed that this detainment policy was actually a harassment technique, in order to punish drivers who refused to purchase the SunPass transponder. The device is used to collect tolls digitally, through a bank account linked to the device.

The benefit of these devices, which are in use by states nationwide, is an ease in congestion at toll-booth choke-points. The driver only has to slow down, rather than stop and complete a transaction manually, as they pass through the toll plaza. These systems are also thought to save the driver money, with a discounted rate on tolls. That is not always the case though. as erroneous ticketing and other glitches can actually leave the motorist paying significantly more.

The more prevalent drawback, for anyone who values their privacy, is that the government and private companies alike are compiling a profile of your personal driving habits. How that data is used, and who it can be shared with, is not exactly clear. It has become an urban myth that states are issuing speeding tickets by simply calculating the time between toll booths and sending you a ticket in the mail, but that data is recorded nonetheless, meaning that they could do this even if they aren't yet. Taking it a step further, it is not unreasonable to suggest that perhaps a private company running a toll road might not share that data, with say, your insurance company.

We do know that this information has been turned over to courts in non-criminal matters, such as divorce proceedings and other civil lawsuits. That is not speculative. This means that this data may be used against you, by someone who is suing you, aside from any criminal implications or traffic infractions. Attempting to protect one's privacy by refusing the digital device and paying cash instead, was made moot by these "Bill Detection Reports" which documented at least as much, if not more information about the vehicle and driver passing through the checkpoint.

Then again, you might just be a driver from out of state, who has little choice but to pay in cash. Of course, out of state drivers are also of keen interest to law-enforcement and agencies like Homeland Security. (Video) Suffice to say, there could be any number of reasonable reasons why a motorist might be paying cash at a toll booth, other than being a terrorist..

Is The E-ZPass Box A Trojan Horse For Privacy Invasions?

CBS 2 Investigates: Living Through An E-ZPass Nightmare


Nonetheless, none of those reasons are suffice to protect your 4th Amendment rights against illegal search and seizure, according to Wednesday's ruling.

"The fact that a person is not free to leave on his own terms at a given moment, however, does not, by itself, mean that the person has been 'seized' within the meaning of the Fourth Amendment," the court wrote in its unsigned decision. 

Wait, WHAT?! 

As it pertains to persons, rather than property, lawyers.com defines "seize" as follows:

 "to detain (a person) in such circumstances as would lead a reasonable person to believe that he or she was not free to leave"

These motorists were blockaded from proceeding, even after they had paid their toll. They were not free to leave. There was no sign when entering the toll road, warning them that they might be detained for reasons other than paying a toll, and thereby invoking an implied consent, by proceeding onto the tollway. Nor was their a policy sign stating that any denomination of US currency was not an acceptable form of payment. Indeed, the toll-takers did accept the bills, but only while detaining the motorist and demanding personal information.

It is important too to keep in mind, that these toll agents are not sworn police officers, but employees of a private company. Nor is any crime alleged, which might trigger a lawful state of arrest. Without an allegation that a crime has been committed, or a court order, there is no lawful basis by which to detain any person. It seems clear, that the FDOT, the private company, and the individual toll-takers themselves might actually be guilty of a crime, namely False Imprisonment, as defined in Statute 787.02 of the Florida Penal Code.

The term “false imprisonment” means forcibly, by threat, or secretly confining, abducting, imprisoning, or restraining another person without lawful authority and against her or his will. A person who commits the offense of false imprisonment is guilty of a felony of the third degree

By keeping the gate down, they did use force directly, and with threat of force from police should they proceed, in order to imprison and/or detain those motorists against their will. Is any private agent now a "lawful authority" qualified to detain another person for any reason, so long as it is a matter of "regulation?" According to this decision, the answer is now yes. It can now be written into public codes, that you do not have Constitutional rights.

"In Florida, a person's right and liberty to use a highway is not absolute; it may be regulated in the public interest through reasonable and reasonably executed regulations," the ruling of the panel continued.

In other words, you have no Constitutional rights when you "choose" to drive on a highway. So long as it is in the public interest, or seen to be in the public interest, regulations supersede your Constitutional liberty. Not only can your rights be written off by some public code that you never heard of before, but that code can also be enforced randomly, at the personal discrimination of the agents enforcing said codes.

The "Bill Detection Report" was not filed for all cash-paying motorists, or even for all motorists paying in specific denominations such as $100's or $50's. Instead, these toll-takers had free-reign to discriminate against any motorist they chose who did not use a digital payment device, and to detain them against their will, for an indeterminate amount of time, ostensibly to fill out this report.

Detaining these motorists really is the critical factor here too. It's not as if the toll-agent was simply reviewing a videotape, to record the vehicle information and license-plate details on travelers who had paid the toll in cash. The agent physically detained these motorists, and demanded personal information from them, in order to fill out the report, before they were allowed to proceed. The concept of "probable cause" has been reduced to something as trivial and non-criminal as paying a debt/fee with cash. A presumption of guilt as these agents hold motorists against their will while seizing personal information without a warrant.

"The Chandlers (Plaintiff's) have not alleged that they were forced to pay their tolls with large-denomination bills, thereby subjecting themselves to whatever delay was caused by completion of the Bill Detection Report," the court ruled. "They chose to pay their toll with large-denomination bills. Nor have they alleged that they asked to withdraw the large report-triggering bill in favor of a smaller delay-free bill and were denied that opportunity." 

Talk about putting the cart in front of the horse. The judge's seem to be collectively ignoring the gorilla in the room to focus on semantics. What difference does it make what denomination the Chandler's paid with?! It's not as if they were paying with a check that needed to be verified by a bank, and it's not as if there was any allegation the cash might be counterfeit. By what right does one private citizen (privately contracted toll-taker) have the right to detain another private citizen (motorist) simply because of the denomination of the cash in their pocket? If such a right cannot be specified, then this case should have absolutely been decided in favor of the motorists.

The Constitution specifies nothing about cash denominations or the authority of a toll-taker. It makes no difference whatsoever whether or not the Chandlers were "forced" to pay their tolls in large denomination bills. In fact, the 4th Amendment specifies that this right "shall not be violated" and then lists the only very specific exceptions. No public code or ongoing private enterprise is listed there among the causes for a search and seizure of any kind, much less imprisoning another citizen, however briefly. Even if the toll-collector themselves were required to make documentation of a cash payment, there is still no right prescribed by which to detain a person while they perform that task.

Furthermore, there is no "bargaining clause" in the Constitution by which the Chandlers might have been obligated to bargain for their freedom by offering to pay with a lower denomination. Nor were they informed what denominations would trigger such a "delay" as the judges term it. In fact, as we have already seen, the trigger was not even the bill itself, but rather the personal discretion of the toll-collector or some other unspecified arbitrary directive. Paying with cash was not in fact the trigger, as many motorists, even paying with large bills, were not detained.  The onus is not on the plaintiff to specify why they were detained, only to show that they were in fact seized and interrogate, without a warrant or probable cause specific to their person(s).

Let us imagine for a moment, that you pump $10 worth of gas into your car on your way to work, and you go into the gas station to pay the attendant with a $20 bill. Now imagine for a moment that the clerk says "Sorry, I can't let you back out of the store until I fill out this form. You will also have to provide me with your personal information so that I can include it on the form. You are not free to leave until you comply, and the form is completed." He then proceeds to roll down the security gate, barring you from leaving. You then stand there waiting for another ten minutes while the clerk wrestles around the back room trying to find the box of forms. You watch as other customers, also paying with $20 bills come and go. Finally, after submitting your private info and the clerk takes his own sweet time filling out the form, you are released to go and explain to your own boss why you are late for your shift. Does this sound reasonable? Certainly not. Yet this is what has just been made "legal" and justified by this ludicrous decision.

Worse, it also means that from now on, probable cause is no longer based upon you specifically as a citizen, but as a blanket which can be applied arbitrarily, any place, any time, and for any reason. Probable cause does not even require the allegation of a crime anymore. For all intents and purposes, with this ruling, there is nothing stopping a state from writing a law that says police no longer need a warrant to come into your home if you use cash, or for any other non-criminal reason. Or even a private security guard for that matter. A town could pass a law which says that a store employee can hold you in their store, for as long as they want, while filling out some form or another. Or perhaps can even come into your home without a warrant, to document its contents in order to check against their own inventory of recently stolen goods perhaps. What is to stop a mall security guard from holding you in the security office, after a store clerk reports that you paid for your lunch with a $100 bill?

Now these examples may sound ridiculous, but no more ridiculous than this ruling is, because this is effectively what these judges have decided. That the 4th Amendment no longer applies to anyone unless it serves the public interest and does not violate any other code.

PDF file of the court's decision

This is not the only assault against the 4th Amendment either, in Florida specifically, revealing a pattern of efforts to eviscerate this portion of our Constitution. Read under the "Constitutionality" argument in this article:

Why Drug Testing of Welfare Recipients is a Bad Idea 

You might also like to read:

Arbitrary Arrests and the Rule of Law

America is dead, long live America.








9.07.2012

Another Useless 'Amber-Alert' Jolts Public

As with so many of these "novelty" public warning systems put into action by "feel-good" legislation, the Amber-Alert system seems to be an utter failure.

On the surface, it seems like it might be a good idea. But on a practical level, one sees that this system has done more harm than good. A system of  "crying wolf" meant to make people feel safe, but at the same time, putting the public on edge frequently, without true cause. We don't usually hear if the missing child has ever been found all, or how the alert was finally resolved. Instead, we get a bunch of quick headlines on the news ticker, a flash on the highway traffic sign, and our Facebook walls are inundated for a day. But we never hear how things wound up.

Which is probably because, in most cases, these alerts are activated of a custody dispute, not a genuine abdusction.

But I thought this one was different. So I jumped on the public-concern bandwagon and posted about how a little girl was abducted right off the street, kicking and screaming, by two men in a truck. It sounded to me like this might be the genuine article, or the sort of case this alert system was really meant for.

As it turns out, the police can't tell when a few kids on a playground are lying and would rather create public panic rather than reach a proper investigative conclusion before crying wolf and getting the public all riled up for nothing.

According to Mid-Hudson News:
NEWBURGH – City Police in Newburgh have examined the South Junior High surveillance videos along with street camera video and footage from privately owned surveillance systems in the area of Monument Street where a five-year-old girl was reported abducted Wednesday by two men and have determined there is no indication that the abduction or any incident that could be perceived as an abduction had occurred.

There was no pickup truck, other vehicle or small child during the time of the reported incident, police said Thursday. The children who reported the supposed incident were observed on the video playing around the school without incident.

Police have not received any missing person reports and have determined the incident did not occur and have closed the investigation.

After the neighborhood children reported the incident, police issued an Amber Alert looking for two men in a pickup truck with green writing on it. The girl purportedly abducted was said to be wearing a pink shirt at the time.
One really begins to wonder why we even have programs like this in place at all. "Boutique" laws and systems named after some poor child who died in a horrific manner, and is brought back from the dead to make a cameo appearance every time the government wants to jolt the public into submission and soak us for even more dollars for inflated police budgets.



9.01.2012

Every Move You Make, They Store the Data

Is there a line to cross anymore? Is there a technology or bit of legislation to come down the pipeline where Americans will say "enough is enough" and decide they don't want to live in a totalitarian police state? I doubt it. Not only is the public entirely apathetic to government surveillance of their every move, but in so many instances, the sheeple embrace it more whole-heartedly than the tenets of the Constitution. The old, if you have nothing to fear, you have nothing to hide rhetoric being a complete brainwash of the average idiot drone.

In May, Utah lawmakers were surprised to learn that the US Drug Enforcement Agency had worked out a plan with local sheriffs to pack the state's main interstate highway, I-15, with Automated License Plate Readers (ALPRs) that could track any vehicle passing through. At a hearing of the Law Enforcement and Criminal Justice Interim Committee, the ACLU of Utah and committee members aired their concerns, asking such questions as: Why store the travel histories of law-abiding Utah residents in a federal database in Virginia? What about residents who don't want anyone to know they drive to Nevada to gamble? Wouldn't drug traffickers catch on and just start taking a different highway? (That's the case, according to local reports.) 
The plan ended up getting shelved, but that did not present a huge problem for the DEA because as it turns out, large stretches of highway in  Texas and California  already use the readers. 
So do towns all over America. Last week Ars Technica  reported that the tiny town of Tiburon in Northern California is using tag reader cameras to monitor the comings and goings of everyone that visits. Despite the Utah legislature's stand against the DEA, local law enforcement uses them all over the place anyway, according to the  Salt Lake City Tribune . Big cities, like Washington, DC and New York, are riddled with ALPRs. According to the Partnership for Civil Justice Fund, ALPRs have become so pervasive in America that they constitute a "covert national surveillance grid." The civil liberties group has mapped the spread of ALPRs, and contends on its Web site that, "Silently, but constantly, the government is now watching, recording your everyday travels and storing years of your activities in massive data warehouses that can be quickly 'mined' to find out when and where you have been, whom you’ve visited, meetings you’ve attended, and activities you’ve taken part in."
The group not only tracks the spread of the cameras but gives people the tools to contest their installation, or at least bring it up with their representatives. They're also pushing Congress to initiate hearings "to determine just how vast and intrusive the network has become." (The ACLU has also sent requests to local law enforcement throughout the country to determine just how many places use the technology and how.)
AlterNet spoke with Carl Messineo, legal director of the Partnership for Civil Justice Fund, about the spread of ALPRs, why the technology is becoming increasingly centralized, and what you can do to have a say in their proliferation. 
Tana Ganeva: What exactly are ALPRs and what do they look like?
Carl Messineo: Tag readers are cameras that can be stationary, mounted on poles or traffic signals. Also they can be put on cruisers and vehicles. They can also be hidden.  Their function is to take images of passing vehicles, and they have an extraordinary capacity technologically to be able to do so, and to use optical character recognition to identify the license plate number. The images may include optionally images of the occupants, the driver and passengers, as well. It takes that data, along with the GPS location of the vehicle, the date, the time, etc., and then stores it, matches up the data, and can send it to a centralized data warehousing center where they can log, historically, the movement of your own vehicle as it has passed through and silently triggered any one of the many thousands of tag readers that over the past few years have been put in place without very much public discussion or debate. 

Full article at link:  http://www.alternet.org/civil-liberties/how-your-movements-are-being-tracked-probably-without-your-knowledge



Computer Hackers In Your Brain

In an age of technology run rampant, it's hard to keep up with what's actually going on, and the dangers that are out there. Everything from how Facebook quantifies everything you say and post through algorithms, to Disney manipulating how your children play video games.

Well, here is some food for thought, a nice shot of espresso for the sleepy sheeple...


Hacking the human brain: researchers demonstrate extraction of sensitive data via brain-computer interface

As hard as it is to believe, what many might think is the last bastion of total privacy, namely, the human mind, is quickly becoming just as vulnerable as the rest of our lives with the invention of mind-reading helmets and other ways to “hack” the mind.

Now security researchers from the University of California, Berkeley, the University of Oxford and the University of Geneva, have created a custom program to interface with brain-computer interface (BCI) devices and steal personal information from unsuspecting victims.

The researchers targeted consumer-grade BCI devices due to the fact that they are quickly gaining popularity in a wide variety of applications including hands-free computer interfacing, video games and biometric feedback programs.

Furthermore, there are now application marketplaces – similar to the ones popularized by Apple and the Android platform – which rely on an API to collect data from the BCI device.

Unfortunately with all new technology comes new risks and until now, “The security risks involved in using consumer-grade BCI devices have never been studied and the impact of malicious software with access to the device is unexplored,” according to a press release.

Full article at link:  http://endthelie.com/2012/08/17/hacking-the-human-brain-researchers-demonstrate-extraction-of-sensitive-data-via-brain-computer-interface/#axzz23unHt3hQ


8.26.2012

Disney Leads Orwellian Face I.D. and Recognition Tech

I don't even know where to begin with this. It would be scary enough to know that the government was developing this sort of technology, but to learn that a private company is doing this is downright scary. And not just any company, but Disney. The happy go-lucky good-times-for-everyone company is now at the leading edge of technology that could make the most devout skeptic of conspiracy shake in their boots.

To start, Disney is now developing technology that will manipulate the way children play video games, based on their gander and physical appearance.

In an age where Kinect and PlayStation Eye/Move are encouraging less traditional interaction with video game consoles and cameras are a mainstay in virtual everything, let alone most mobile devices, one man at Disney Interactive sees video game systems moving even further from the path of the familiar and letting the console games make their own decisions based on — you guessed it — physical appearance.

Both ‘System and method for number of players determined using facial recognition’ (US Patent Application 20120214585) and ‘Gender and age based gameplay through face perception’ (US Patent Application 20120214584) list Phillippe Paquet as the sole inventor and offer to leverage existing technology in interesting ways.
Click here for more

As if it weren't creepy enough that Disney is planning to manipulate the way your children play video games, or even watch television, the technolgy being developed gets a whole lot more creepy. It's not just for kids folks. In this instance, we see that the technology is not just in development, but has already been deployed, in order to steal your credit card number, and who knows what else.
A software engineer in my Facebook community wrote recently about his outrage that when he visited Disneyland, and went on a ride, the theme park offered him the photo of himself and his girlfriend to buy – with his credit card information already linked to it. He noted that he had never entered his name or information into anything at the theme park, or indicated that he wanted a photo, or alerted the humans at the ride to who he and his girlfriend were – so, he said, based on his professional experience, the system had to be using facial recognition technology. He had never signed an agreement allowing them to do so, and he declared that this use was illegal. He also claimed that Disney had recently shared data from facial-recognition technology with the United States military.

Yes, I know: it sounds like a paranoid rant. Except that it turned out to be true. News21, supported by the Carnegie and Knight foundations, reports that Disney sites are indeed controlled by face-recognition technology, that the military is interested in the technology, and that the face-recognition contractor, Identix, has contracts with the US government – for technology that identifies individuals in a crowd. Full story here
Okay, way creepy. How much worse could it get? Some company stealing your credit card info. Aside from the far more nefarious aspects if this, just imagine for a moment that some kid manning that ride and bucking for a promotion decided to bill your credit card for a few pics that you had said "NO!" to. Good luck arguing that with your bank or even in court a month later when you get home from vacation. You will get charged the fee by this "trusted" company and that will be that.

Oh, but it does get worse my friend, much worse. What if they could not only charge your credit card, but suddenly actually BECOME YOU? Not only to rack up your credit card, but perhaps, let's say, to go out and become a gun-wielding madman? Wow, now that's totally far-fetched and unbelievable, right? Well guess again my friends. Yes they absolutely can, become you...
LAKE BUENA VISTA, Fla. (CBS Tampa) – Scientists employed by the Walt Disney Company have developed technology that allows them to replicate, with near perfect accuracy, the very versatile human face.

Documents posted on the official Disney Research website details plans for what they refer to as physical face cloning. Click here for more
Of course, they are talking about using this technology to be applied to animatronics, which might make sense for Disney given their movie and character development. However, there is NOTHING that says this can't and won't be used by a live subject, and not just animatornic figures. Essentially, this technology makes it completely possible for one person to completely and realistically become another person. Especially when it comes to that person being recognized by surveillance cameras. Are you following me here?

Disney now has the technology to put a plastic face on a human being, that is completely life-like in every way. So lifelike, that surveillance cameras and even eyewitnesses would describe YOU as the culprit or character in any activity such as a bombing, mass-shooting, Manchurian Candidate election, or any number of nefarious ends.


This technology that we thought only existed in the imagination, in movies, is very very real. They can, at their will, take your credit card number, make a purchase to verify that you were there, and walk into a movie theater with YOUR FACE and shoot up a few dozen people. And of course, blame you for it. This is not fantasy, this is reality...


Now if all that is not enough to creep you out, I suggest you have a good look at the REAL face of this company called Disney...

Sexual subliminals in kids' shows






Latest Headlines

Which Mythical Creature Are You?                         Sexy Out of This World Aliens                         Is That a Ghost or Just a Dirty Lens                         Can You Survive the Zombie Apocalypse?                          Do You Know Vampires?                          Preparing for the Zombie Apocalypse                          Ten Amazing Urban Legends That Are Actually True                          Unbelievable UFO Sightings                          Is Your Dealer a Cop?

Search This Blog