10 ways ‘the police state’ tracks you


 

When discussing the “promotion of a police state” in music videos, I am not referring to an abstract, theoretical concept. It is real and it is happening. The high-tech chips and devices seen a few years ago in sci-fi movies and futuristic music videos are used on us today. Here’s an article from the Times-Standard describing 10 ways the police state keeps track of you.

The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry, which now seems to be becoming a war on “liberty and privacy.” Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot.

High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:

GPS — Global positioning chips are now appearing in everything from U.S. passports and cell phones to cars. More common uses include tracking employees, and for all forms of private investigation. Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.

Internet — Internet browsers are recording your every move forming detailed cookies on your activities. The National Security Administration has been exposed as having cookies on their site that don’t expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide no privacy to users while technologies advance for real-time social network monitoring is already being used. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple’s iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cybersurveillance by citizens.

RFID — Forget your credit cards which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your Social Security number. Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more. RFID “proximity cards” take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access. Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless — perhaps including tracking hard currency so we can’t even keep cash undetected. (Also see microchips below).

Traffic cameras — License plate recognition has been used to remotely automate duties of the traffic police in the United States, but have been proven to have dual use in England such as to mark activists under the Terrorism Act. Perhaps the most common use will be to raise money and shore up budget deficits via traffic violations, but uses may descend to such “Big Brother” tactics as monitors telling pedestrians not to litter as talking cameras already do in the UK.

Computer cameras and microphones — The fact that laptops — contributed by taxpayers — spied on public school children (at home) is outrageous. Years ago Google began officially to use computer “audio fingerprinting” for advertising uses. They have admitted to working with the NSA, the premier surveillance network in the world. Private communications companies already have been exposed routing communications to the NSA. Now, keyword tools — typed and spoken — link to the global security matrix.

Public sound surveillance — This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous “keywords.” This technology has been launched in Europe to “monitor conversations” to detect “verbal aggression” in public places. Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.

Biometrics — The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in national identification cards.

DNA — Blood from babies has been taken for all people under the age of 38. In England, DNA was sent to secret databases from routine heel prick tests. Several reports have revealed covert Pentagon databases of DNA for “terrorists” and now DNA from all American citizens is databased. Digital DNA is now being used as well to combat hackers.

Microchips — Microsoft’s HealthVault and VeriMed partnership is to create RFID implantable microchips. Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future. The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.

Facial recognition — Anonymity in public is over. Admittedly used at President Obama’s campaign events, sporting events, and most recently at the G8/G20 protests in Canada. This technology is also harvesting data from Facebook images and surely will be tied into the street “traffic” cameras.

All of this is leading to Predictive Behavior Technology — It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling. It’s been marketed for such uses as blocking hackers. Things seem to have advanced to a point where a truly scientific Orwellian world is at hand. It is estimated that computers know to a 93 percent accuracy where you will be, before you make your first move. Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.

Many of us are asking: What would someone do with all of this information to keep us tracked, traced, and databased? It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.

 

http://vigilantcitizen.com/latestnews/10-ways-the-police-state-trac...

Views: 97

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Robert Carobene on July 28, 2012 at 12:12am

This is so true but we have to stop this from becoming world wide!

Comment by Burbia on May 24, 2011 at 12:46pm
i think you just described the entire surveillance phenomenon...

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
47 minutes ago
kacang99 commented on tjdavis's photo
Thumbnail

The Name Game

"very nice, main di kacang99 demo situs slot kasih akun demo gratis"
2 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
3 hours ago
Olivia Brooks updated their profile
9 hours ago
kacang99 updated their profile
11 hours ago
John Miller was featured
12 hours ago
tjdavis's 2 blog posts were featured
12 hours ago
Zfort Group's blog post was featured
12 hours ago
Doc Vega's 6 blog posts were featured
12 hours ago
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
17 hours ago
Burbia commented on tjdavis's photo
17 hours ago
Profile Iconkacang99, Seeta Sathe and Olivia Brooks joined 12160 Social Network
18 hours ago
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
yesterday
tjdavis posted a photo
yesterday
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Sunday
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Thursday
Doc Vega posted blog posts
Aug 27

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted