10 Incredible Ways You Are Being Tracked, Catalogued and Controlled

Author John Whitehead has a terrifying new book out called “Government of Wolves: The Emerging American Police State.” The basic thrust and premise of the book is that America’s basic freedoms are under heavy assault on all fronts, and are in danger of being washed away entirely.

He outlines exactly what these various attacks are, how they are manifesting themselves, and precisely how we are being kept under round the clock surveillance at this point, by our own government and forces cooperating with them (mega corporations).

There are more than just these touched on in the book, but to provide a brief overview, among others, these are just some of the ways you are being tracked, around the clock in the “land of the free.”

Based on your consumer activities: Federal and State law enforcement agencies have begun acting in partnership, sharing data collected on you, and they’ve collected a lot of data in an attempt to identify what they term as “suspicious persons.”

What kinds of things can land you on the “suspicious persons” list, you ask? Great question. It turns out that it could be almost anything, up to and including people buying pallets of bottled water, photographing government buildings, and applying for a pilot’s license. Major retailers are getting in on the fun as well, and are often eager participants.

Big Box retailers like Target have been tracking and assessing the behavior of their customers for years. In 2015, mega-food corporations will be rolling out high-tech shelving outfitted with cameras in order to track the shopping behavior of customers, as well as information like the age and sex of shoppers.

Based on your public activities: It’s not hard to see which way the wind is blowing. Following the lead of big government, private corporations are jumping into the fray as well, negotiating incredibly lucrative contracts with various law enforcement agencies (at all levels) around the country.

The major goal here is to create an interlocking, utterly inescapable web of surveillance that encompasses all major urban centers. Companies like NICE and Bright Planet are selling services, expertise, and equipment to police departments with the promise of monitoring large groups of people seamlessly (think protests and rallies).

They are also engaging in extensive online surveillance, looking for any hints of “large public events, social unrest, gang communications, and criminally predicated individuals.” Defense contractors are attempting to take a bite out of this lucrative market as well. Raytheon has recently developed a software package known as Riot, which promises to predict the future behavior of an individual based upon his social media posts.

Based on your phone activities: The CIA is on record as having paid AT&T over $10 million dollars a year for years on end, in order to gain access to data on Americans’ phone calls abroad.

Based on your computer activities: Federal agents now employ a number of increasingly sophisticated hacking methods (oftentimes by hiring the world’s best hackers into their own ranks) in order to gain access to your computer activities and “see” whatever you’re seeing on your monitor.

Hacking software can be installed any number of ways, including USB, or via an email attachment or software update. It can then be used to search through files stored on a hard drive, log keystrokes, or take real time screenshots of whatever a person is looking at on their computer, whether personal files, web pages, or email messages. It can also be used to remotely activate cameras and microphones.

Based on your behavior: Thanks to a flood of federal money, police departments nationwide are able to fund a variety of new surveillance systems that turn the most basic human behaviors into suspicious situations to be studied and analyzed. Police in California and Massachusetts have received federal funds to create systems like that operated by the New York Police Department, which “links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists.”

Police all across the country are also now engaging in unprecedented, large scale data mining operations, oftentimes with the help, and even blessing of private companies, in order to develop city-wide nets of surveillance. For example, police in Fort Lauderdale, Florida, now work with IBM in order to “integrate new data and analytics tools into everyday crime fighting.”

Based on your face: Facial recognition software promises to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily lives. The goal here is for government agents to be able to scan a crowd of people and instantly identify everyone present. Facial recognition programs are being rolled out in states all across the country (only twelve states do not use facial recognition software).

For example, in Ohio, 30,000 police officers and court employees are able to access the driver’s license images of people in the state, without any form of oversight to track their views or why they’re accessing them. The FBI is developing a $1 billion program, Next Gen Identification, which involves creating a massive database of mugshots for police all across the country.

Based on your car: License plate scanners, which can read plates from a distance of several hundred feet, can identify the owner of any car that comes within its sights, are growing in popularity among police agencies. High resolution cameras are affixed to overpasses or cop cars, these devices give police a clear idea of where your car was at a specific date and time, whether the doctor’s office, the bar, the mosque, or at a political rally.

State police in Virginia used license plate readers to record every single vehicle that arrived to President Barack Obama’s inauguration in 2009 from Virginia. They also recorded the license plates of attendees at rallies prior to the election, including for then-candidate Obama and Republican vice presidential candidate Sarah Palin. This data collection came at the request of the U.S. Secret Service.

Based on your social media activities: The use of social media as a form of surveillance will have some frightening consequences in coming years. As Helen Popkin, writing for NBC News observed, “We may very well face a future where algorithms bust people en masse for referencing illegal ‘Game of Thrones’ downloads, or run sweeps for insurance companies seeking non-smokers confessing to lapsing back into the habit.

Instead of that one guy getting busted for a lame joke misinterpreted as a real threat, the new software has the potential to roll, Terminator-style, targeting every social media user with a shameful confession or questionable sense of humor.”

Based on your metadata: Metadata is innocuous and almost unnoticed by most, but it is an incredibly invasive dataset. Indeed, with access to one’s metadata, one can “identify people’s friends and associates, detect where they were at a certain time, acquire clues to religious or political affiliations, and pick up sensitive information like regular calls to a psychiatrist’s office, late-night messages to an extramarital partner or exchanges with a fellow plotter.”

The National Security Agency (NSA) has been particularly interested in metadata, compiling information on Americans’ social connections “that can identify their associates, their locations at certain times, their traveling companions and other personal information.”

Mainway, the main NSA tool used to connect the dots on American social connections, collected 700 million phone records per day in 2011. That number increased by 1.1 billion in August 2011. The NSA is now working on creating “a metadata repository capable of taking in 20 billion ‘record events’ daily and making them available to N.S.A. analysts within 60 minutes.”

From the skies: Absolutely nothing will escape the government’s all seeing eyes, especially when drones take to the skies in 2015. These smart devices, ranging from the size of small aircraft to as small as a grasshopper will have the ability to see through the walls of your home, and be capable of tracking your every movement.

Interestingly and compellingly, however, one of the major contributing factors to our loss of privacy, and with it, freedom, goes unmentioned by the author. The fact that we are actively participating in our own surveillance.

Remember the Boston Bombings? Remember how the culprits were identified? It wasn’t from government placed cameras on buildings or signal lights, but rather, pictures taken off of someone’s cell phone.

We document ourselves and our lives. We document each other, and we gleefully pass that information on to the State. Even if we didn’t, there is little to prevent them from getting it anyway, but we cannot pretend that We, the People, have no culpability.

In the end, the author concludes that the surest way to allow the Police State to come to full flower is our own, continued inaction. All we need to do is…nothing. Nothing at all. If we do that, the Police State is inevitable. The author ends on a chilling note: “Thus, we have arrived in Orwell’s world. The question now is: will we take a stand and fight to remain free or will we go gently into the concentration camp?” "

Views: 839

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by B or D on March 5, 2014 at 5:26pm

Were being Tracked traced and databased, by the Governments, aided by the private companies all around the world!

I'm not ready to trade my Liberty for supposed security, are you?

a few more ways we are being tracked if not already in the above story are as fallows.

GPS, (global positioning). which is things like U.S. passports now, cell phones, many cars have them now as well.

Apple recently announced they are goig to be collecting the precise location of iphone users via GPS for public viewing!! You can read more about " How your Apple iPhone spies on You " at this link here:::: http://www.activistpost.com/2010/07/how-your-apple-iphone-spies-on-...

ofcourse we all know that internet browsers record your every move ( cookies) on your activities. Hell, the NSA was exposed as having cookies on there site that wont expire till 2035.. you can read that story here:: http://www.cbsnews.com/news/nsa-web-site-uses-banned-cookies/


search engines know what you searched for and where you were when you did searches LAST SUMMER! Read that story at the link here::: http://www.computerworld.com.au/article/279915/google_knows_where_s...


online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public!! Link here::: http://www.prnewswire.com/news-releases/ip-adresscom-shows-visitors...

Social Networks provide NO privacy to users what so ever! Though technologies for real--time social network monitoring are being used already. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information and data! (Cybersecurity Act would give president power to SHUT DOWN the internet!) Cybersecurity Act link is right here::::http://rawstory.com/news/2008/Cybersecurity_Act_seeks_broad_powers_...
S.773-Cybersecurity Act of 2009 ( OPEN CONGRESS ) Link is here::http://www.opencongress.org/bill/s773-111/show

Things as simple as your movie membership cards, cvs, costco, all grocery chain savings cards, are tracked meticulously. Though they are simple things. They tell alot about you!
And RFID proximity cards!!! take tracking to a new level in uses ranging from loyalty cards, student IDs, Work ID, Physical access, and computer network access.. Read about Multifunctional ID cards to get a better picture of what these can actually do. Heres a link:: http://www.alphacard.com/glossary/multifunctional-id-cards

Check this out.. RFID keeps getting smaller. On February 13, Hitachi unveiled a tiny, new "powder" type RFID chip measuring 0.05 x 0.05 mm -- the smallest yet -- which they aim to begin marketing in 2 to 3 years. By relying on semiconductor miniaturization technology and using electron beams to write data on the chip substrates, Hitachi was able to create RFID chips 64 times smaller than their currently available 0.4 x 0.4 mm mu-chips. Like mu-chips, which have been used as an anti-counterfeit measure in admission tickets, the new chips have a 128-bit ROM for storing a unique 38-digit ID number.

The new chips are also 9 times smaller than the prototype chips Hitachi unveiled last year, which measure 0.15 x 0.15 mm.

At 5 microns thick, the RFID chips can more easily be embedded in sheets of paper, meaning they can be used in paper currency, gift certificates and identification. But since existing tags are already small enough to embed in paper, it leads one to wonder what new applications the developers have in mind.
[Source: Fuji Sankei] Link::: http://pinktentacle.com/2007/02/hitachi-develops-rfid-powder/

I'll add more info later today.
Hope you enjoy some of the info. and if you know someone who doesn't know how things REALLY ARE, please pass this info along.
B

Comment by Patriot Pete on March 4, 2014 at 7:50pm

Incredible as it may seem, a sign with text on it held in front of your switched on digital tv will show up on the internet, the trick is how to search to find it, but I know someone who successfully demonstrated it 

Something else to be aware of is that your past details within a national socialised medical system are on the whole national or state medical computer network and any receptionist or medico knows certain details from the past before you can say them. I once asked a receptionist at a different hospital to my usual how she knew my past place of abode, she guiltily said "oh it's on the computer"

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

Prince - Cinnamon Girl (Official Music Video)

"Cinnamon Girl" from 'Musicology' (2004)☔️ Listen to more Prince here https://lnk.to/PrinceStream📺 Watch all the official Prince videos here http://bit.ly/P...
1 hour ago
MAC posted photos
1 hour ago
FREEDOMROX posted a blog post
3 hours ago
MAC posted a discussion
5 hours ago
Doc Vega posted blog posts
8 hours ago
rlionhearted_3 commented on rlionhearted_3's photo
yesterday
rlionhearted_3 commented on rlionhearted_3's photo
Thumbnail

Hooray for Russian TV

".Supposedly, Russians have evidence that links Burisma and the recent terror attacks. Burisma for…"
yesterday
cheeki kea commented on rlionhearted_3's photo
Thumbnail

True Story

"Well I bet Iran remembers that true story. ~ and there in lies the problem...because they would…"
yesterday
cheeki kea commented on rlionhearted_3's photo
Thumbnail

Hooray for Russian TV

" That one is a shocker! even for them. What could have driven and compelled them to dredge up…"
yesterday
cheeki kea commented on tjdavis's video
Thumbnail

It Wasn't Fauci: How the Deep State Really Played Trump (mini-doc)

"Excellent video. I hope this one makes it to the features page it sure deserves it. Answers a lot a…"
yesterday
cheeki kea favorited tjdavis's video
yesterday
tjdavis posted videos
Wednesday
Doc Vega posted blog posts
Tuesday
tjdavis posted a photo
Tuesday
rlionhearted_3 posted photos
Tuesday
MAC posted a video
Tuesday
rlionhearted_3 commented on cheeki kea's photo
Thumbnail

who would win a debate?

"It gets waaayy worse. TPTB want to normalize this gross fat bullshit."
Monday
Doc Vega posted photos
Monday
cheeki kea posted photos
Monday
cheeki kea commented on cheeki kea's photo
Monday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted