End Times and Current Events

General Category => Police State/NWO => Topic started by: Mark on July 11, 2012, 07:59:34 am

Title: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on July 11, 2012, 07:59:34 am
14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don't think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history.  The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.  Previous generations never had to deal with "pre-crime" surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above.  Previous generations would have never even dreamed that street lights and refrigerators might be spying on them.  Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you.  We are rapidly heading toward a world where there will be no such thing as privacy anymore.  Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you.  The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you....

#1 "Pre-Crime" Surveillance Cameras

A company known as BRS Labs has developed "pre-crime" surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously.  In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco....

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.
#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI....

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.
#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same "pornoscanner" technology currently being utilized by the TSA at U.S. airports....

American cops are set to join the US military in deploying American Science & Engineering's Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call "the amazing radioactive genital viewer," now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America's streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don't worry, it's not a violation of privacy. As AS&E's vice president of marketing Joe Reiss sez, "From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be."
You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind.  The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore.  But obviously the potential for abuse with this kind of technology is extraordinary.  The following is from a recent article by Dick Pelletier....

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.
#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities....

The Department of Homeland Security has launched a program to "facilitate and accelerate the adoption" of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces "a very big hurdle having to do with privacy."

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a "middleman" between drone manufacturers and first-responder agencies "before they jump into the pool," said John Appleby, a manager in the DHS Science and Technology Directorate's division of borders and maritime security.
The fact that very few Americans seem concerned about this development says a lot about where we are as a nation.  The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa.  Will we eventually get to a point where we all just consider it to be "normal" to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described....

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.
A single "request" can involve information about hundreds of customers.  So ultimately the number of Americans affected by this could reach into "the tens of millions" each year....

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.
Perhaps you should not be using your cell phone so much anyway.  After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens.  Just check out what is going on in India....

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.
#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don't realize this, but RFID microchips are steadily becoming part of the very fabric of our lives.  Many of your credit cards and debit cards contain them.  Many Americans use security cards that contain RFID microchips at work.  In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students....

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.
#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves....

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.
#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don't laugh.

Such technology is actually being actively developed.  The following is from a recent NewScientist article....

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology's Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.
#11 Data Mining

The government is not the only one that is spying on you.  The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit.  It is called "data mining", and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone....

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data 'transactions' a year.
#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening.  New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities.  The following is from a recent article by Paul Joseph Watson for Infowars.com....

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.
#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private.  However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level....

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.
Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don't laugh.

That is exactly what CIA Director David Petraeus says is coming....

Petraeus says that web-connected gadgets will 'transform' the art of spying - allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

'Transformational’ is an overused word, but I do believe it properly applies to these technologies,' said Petraeus.

'Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -  all connected to the next-generation internet using abundant, low-cost, and high-power computing.'

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously  'dumb' home appliances such as fridges, ovens and lighting systems.
For many more ways that Big Brother is spying on you, please see these articles....

"Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You"

"30 Signs That The United States Of America Is Being Turned Into A Giant Prison"

The things that I have written about above are just the things that they admit to.

There are also many "black box technologies" being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below....


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on July 11, 2012, 01:42:33 pm
New Homeland Security Laser Scanner Reads People At Molecular Level

The Department of Homeland Security will soon be using a laser at airports that can detect everything about you from over 160-feet away.

Gizmodo reports a scanner that could read people at the molecular level has been invented. This laser-based scanner – which can be used 164-feet away — could read everything from a person’s adrenaline levels, to traces of gun powder on a person’s clothes, to illegal substances — and it can all be done without a physical search. It also could be used on multiple people at a time, eliminating random searches at airports.

The laser-based scanner is expected to be used in airports as soon as 2013, Gizmodo reports.

The scanner is called the Picosecond Programmable Laser. The device works by blasting its target with lasers which vibrate molecules that are then read by the machine that determine what substances a person has been exposed to. This could be Semtex explosives to the bacon and egg sandwich they had for breakfast that morning.

The inventor of this invasive technology is Genia Photonics. Active since 2009, they hold 30 patents on laser technology designed for scanning. In 2011, they formed a partnership with In-Q-Tel, a company chartered by the CIA and Congress to build “a bridge between the Agency and a new set of technology innovators.”

Genia Photonics wouldn’t be the only ones with similar technology as George Washington University developed something similar in 2008, according to Gizmodo. The Russians also developed something akin to the Picosecond Programmable laser. The creators of that scanner claim that “it is even able to detect traces of explosives left by fingerprints.”

But what makes Genia Photonics’ version so special is that the machine is more compact compared to the other devices and can still maintain its incredible range.

Although the technology could be used by “Big Brother,” Genia Photonics states that the device could be far more beneficial being used for medical purposes to check for cancer in real time, lipids detection, and patient monitoring.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Christian40 on July 13, 2012, 02:24:48 am
These are some pretty telling articles that i read. The 3. Mobile Backscatter Vans is pretty tyrannical, perhaps having some device that blocks them from doing what they want would be good. It just shows how Orwellian they are. I would pray that God would be gracious and wreck their computers and vans.

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on July 13, 2012, 05:03:42 pm

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on December 05, 2012, 11:23:10 am
Verizon Patent Could Listen In On Customers

Verizon has filed a patent for targeting ads that collect information from infrared cameras and microphones that can detect the amount of people and types of conversations happening in customers’ living rooms.

The set-top box technology is not the first of its kind – Comcast patented similar monitoring technology in 2008 that recommended content to users based on people it recognized in the room. Google TV also proposed a patent that would use video and audio recorders to figure out exactly how many people in a room were watching its broadcast.

Verizon filed for the application in May 2011, but the report was published last week due to laws stating that all patent applications be published after 18 months.

FierceCable first publicized the Verizon patent that gives examples of the DVR’s acute sensitivity in customers’ living rooms: argument sounds prompt ads for marriage counseling, and sounds of “cuddling” prompt ads for contraceptives.

“If detection facility detects one or more words spoken by a user (e.g., while talking to another user within the same room or on the telephone), advertising facility may utilize the one or more words spoken by the user to search for and/or select an advertisement associated with the one or more words,” Verizon states in the patent application.

The patent goes on to say that the sensors would also be able to determine if a viewer is exercising, eating, laughing, singing, or playing a musical instrument, and target ads to viewers based on their mood. It also could use sensors to determine what type of pets or inanimate objects are in the room. The system can also “dynamically adjust parental control features” if it detects that young children are present in the room.

There are several types of sensors can be linked to the targeted advertising system. These include 3D imaging devices, thermographic cameras and microphones.

Users are also given the option to link their smartphones and tablets to the detection system to directly increase its sensitivity.

“If detection facility detects that the user is holding a mobile device, advertising facility may be configured to communicate with the mobile device to direct the mobile device to present the selected advertisement. Accordingly, not only may the selected advertisement be specifically targeted to the user, but it may also be delivered right to the user’s hands,” the Verizon application states.

Verizon officials declined to comment to FierceCable about the patent application.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on December 05, 2012, 02:04:19 pm
One more nail.

And the sales pitch is just as I expected. Basically... "You deserve an easier life, it's fast, it personalized just for you! It's free, free, free! Just bow down and take it, and the world is your digital playground!".

"There hath no temptation taken you but such as is common to man: but God [is] faithful, who will not suffer you to be tempted above that ye are able; but will with the temptation also make a way to escape, that ye may be able to bear [it]." 1 Corinthains 10:13 (KJB)

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on December 13, 2012, 07:01:40 am

Verizon's Creepy Idea to Spy on TV Viewers

 A couple snuggling in front of the TV could end up getting bombarded by commercials for romantic vacations, flowers or even condoms and birth control pills. That creepy invasion-of-privacy scenario comes from a Verizon patent idea that envisions spying on TV viewers for the sake of serving up related ads.

Verizon aims to track the behavior of TV watchers as they sing happy songs, play with a pet dog, or enjoy some supposedly private time with a loved one on the couch. The tracking system would then search terms related to the behaviors it sees — such as "cuddling" or "romance" — and present viewers with TV ads related to that topic during commercial breaks, according to the patent filing first discovered by FierceCable.

The romance scenario is just one example detailed in the patent filing. But Verizon also describes the capability to detect a person's mood from whether he or she is singing or humming a "happy" song, so that it can select ads geared for happy people.

Similar patent filing examples include fighting, wrestling, playing a game or somehow competing with another person. The system could also identify objects such as pets, soft drink cans or a bag of chips in a person's hand, and room decorations or furniture.

The patent filing even suggests the tracking system communicating with whatever smartphone or tablet a TV viewer might happen to have in his or her hands. That would allow Verizon to sneak a look at the websites a person is browsing, read email drafts or see what e-book he or she is reading. [Spy App Can Turn Smartphones Against You]

Such a patent idea would turn TV set-top boxes into spy boxes with sensors for both seeing and hearing the activity in front of the TV. Many TV viewers already own such set-top boxes to access pay-per-view services, digital video recordings and Internet streaming.

The patent was filed back on May 26, 2011. But it only appeared on the U.S. Patent & Trademark Office's website on Nov. 29, 2012, because all patent applications are published after 18 months, according to Ars Technica.

Plenty of e-commerce and social media websites already track people's personal information and online habits. Many video games also track the virtual behavior of gamers for the sake of improving future game design or providing feedback on their in-game progress.

The almost constant online tracking has allowed websites such as Facebook and Google to try serving up ads related to whatever online information is available about a person. But the Verizon idea crosses the divide between the digital and real worlds to extract information by essentially monitoring people's behaviors in real life — an intrusion that many people may find extremely uncomfortable.

Still, the patent filing may not end up getting approved. Companies file patents on plenty of ideas that never become a reality. But whatever the case, the Verizon idea may end up getting as much public disapproval as Microsoft's patent filing aimed at tracking employee behavior at work.

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on December 16, 2012, 12:00:29 pm
Smart TVs can spy on their owners

Viewers, beware: while you’re watching TV, your TV might be watching you back. A security firm discovered that Samsung’s Smart TV can give hackers access to the device’s built-in camera and microphones, allowing them to watch everything you do.

The Malta-based firm ReVuln posted a video showing its team of researchers hacking into one of the Samsung TVs and accessing its settings, channel lists, widgets, USB drives, and remote control configurations. The security flaw allows hackers to access any and all personal data stored on the TV.

“We can install malicious software to gain complete root access to the TV,” the video writes.

With this access, hackers can use the Smart TVs built-in camera and microphones to see and hear everything in front of it. Instead of just watching TV, viewers could themselves be watched without knowing it.

But this flaw isn’t present in just one specific model. The vulnerability affects all 11 Samsung televisions of the latest generation. The Smart TVs have many of the same features as a computer, but lack the same kind of protection. The devices do not have security features such as firewalls and antivirus software.

Fortunately for concerned viewers, the problem has a silver lining: hackers must first breach the network that the television is connected to, as well as know the IP address of the device. As a result, security breaches would likely only occur as a targeted attack against an individual, rather than randomly. Unlike an Internet virus, a hacker would have to exploit the network manually.

Luigi Auriemma, co-founder of  ReVuln, told NBC News that the main concern with this possibility is that hackers could target specific companies or individuals whose businesses they have an interest in.

“In our opinion, it’s more interesting and realistic to think about attacks [against] specific targets reached via open/weak/hacked Wi-Fi or compromised computers of a network, instead of mass-exploiting via the Internet,” Auriemma wrote in a statement for NBC. “That’s interesting due to the effects of the vulnerability (retrieving information and the possibility of monitoring) which are perfect for targeted attacks, from a specific person with a TV at home to a company with TVs in its offices.”

A hacker must be connected to the local network in order to access the Smart TV – so keeping wifi passwords secure is very important. Those with stalkers or valuable data on their device may want to be particularly cautious.

“Consider that little kid next door that’s good with computers,” said Travis Carelock, content director and research technologist at Black Hat.

“We’re moving into a whole different world,” said Trey Ford, general manager of the group. “Growing up, you and I didn’t have a wirelessly connected camera pointing at the couch.”

Viewers who have any of the plasma 8000 series, the 7500 LED LCD series, the 8000 LED LCD series or the 9000 LED LCD series might want to make sure to keep personal data off their TVs and be careful about what they say or do in the device’s presence.

Even though chances might be slim that the average viewer will have his or her Smart TV hacked into, the capability of technology to watch its viewers is a chilling glimpse into a more high-tech future.

“That’s what will make this a whole lot more fun in the future,” Ford said.

Samsung said it is launching an investigation to look into the security flaw.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Psalm 51:17 on December 16, 2012, 11:39:00 pm

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on January 08, 2013, 04:02:45 am
Panasonic’s TVs Can Recognize a Face

 Panasonic’s new product introductions at the Consumer Electronics Show in Las Vegas touch on what is becoming a common theme —–making your TV do the work of finding shows you want to watch.

The company announced a feature called “My Home Screen” that will show a viewer customized suggestions of TV shows, streaming shows and Internet content, all on one screen. The idea is to put all of the content in one place so a viewer does not have to search separately for TV shows and video on demand, for instance. Each family member can have a personalized screen, and will not have to sign in — the higher-end Panasonic TVs will have a built-in camera that will use face recognition to determine whose preferences to display.

rest: http://bits.blogs.nytimes.com/2013/01/07/panasonics-tvs-can-recognize-a-face/

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on January 08, 2013, 04:55:23 am
I read about two other companies that have filed patents on that kind of technology, suggesting this type "feature" is the next new wave in tv tech.

I knew as soon as I saw a tv with a camera, I knew what was coming. And the sales pitch is just like I expected. Thank you Jesus for the discernment.

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Christian40 on March 06, 2013, 10:01:02 pm
ARGUS-IS - DARPA 1.8-Gigapixel Video Surveillance Platform


DARPA and the US Army have taken the wraps off ARGUS-IS, a 1.8-gigapixel video surveillance platform that can resolve details as small as six inches from an altitude of 20,000 feet (6km). ARGUS is by far the highest-resolution surveillance platform in the world, and probably the highest-resolution camera in the world, period.

ARGUS, which would be attached to some kind of unmanned UAV (such as the Predator) and flown at an altitude of around 20,000 feet, can observe an area of 25 square kilometers (10sqmi) at any one time. If ARGUS was hovering over New York City, it could observe half of Manhattan. Two ARGUS-equipped drones, and the US could keep an eye on the entirety of Manhattan, 24/7.

It is the definition of "observe" in this case that will blow your mind, though. With an imaging unit that totals 1.8 billion pixels, ARGUS captures video (12 fps) that is detailed enough to pick out birds flying through the sky, or a lost toddler wandering around. These 1.8 gigapixels are provided via 368 smaller sensors, which DARPA/BAE says are just 5-megapixel smartphone camera sensors. These 368 sensors are focused on the ground via four image-stabilized telescopic lenses.
he end result, as you can see in the (awesome) video above, is a mosaic that can be arbitrarily zoomed. In the video, a BAE engineer zooms in from 17,500 feet to show a man standing in a parking lot doing some exercises. A white speck is a bird flying around. You can't quite make out facial features or license plates (phew), but I wonder if that would be possible if ARGUS was used at a lower altitude (during a riot, say).

ARGUS's insane resolution is only half of the story, though. It isn't all that hard to strap a bunch of sensors together, after all. The hard bit, according to the Lawrence Livermore National Laboratory (LLNL), is the processing of all that image data. 1.8 billion pixels, at 12 fps, generates on the order of 600 gigabits per second. This equates to around 6 petabytes — or 6,000 terabytes — of video data per day. From what we can gather, some of the processing is done within ARGUS (or the drone that carries it), but most of the processing is done on the ground, in near-real-time, using a beefy supercomputer. We're not entirely sure how such massive amounts of data are transmitted wirelessly, unless DARPA is waiting for its 100Gbps wireless tech to come to fruition.

The software, called Persistics after the concept of persistent ISR — intelligence, surveillance, and reconnaissance — is tasked with identifying objects on the ground, and then tracking them indefinitely. As you can see in the video, Persistics draws a colored box around humans, cars, and other objects of interest. These objects are then tracked by the software — and as you can imagine, tracking thousands of moving objects across a 10-square-mile zone is a fairly intensive task. The end user can view up to 65 tracking windows at one time.

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on March 07, 2013, 02:43:18 am
And that is the technology they admit to!

Title: Police scanners record location and movement of every car in America
Post by: Christian40 on July 18, 2013, 02:43:06 am
It is not enough that the Obama regime’s National Security Agency (NSA) collects our every email, phone call, credit card purchase, and bank transaction. Our police departments now have records on the location and movement of your cars — all done in the name of protecting us from “terrorists” and criminals.

The images of our cars and license plates are taken by automated scanners affixed to bridges and buildings, or mounted on police cars, like the one below.


But it turns out that license plate scanners actually produced only a small fraction of “hits,” or alerts to police that a suspicious vehicle has been found. Which then begs the question of what’s the real reason why our government is recording our cars’ every movement and location.

Anne Flaherty reports for the Associated Press, July 17, 2013, that your local or state police departments have photographs of your car in their files, noting where you were driving on a particular day, even if you never did anything wrong.

According to a study published July 17, 2013, by the American Civil Liberties Union, law enforcement agencies across America, using automated scanners, have amassed millions of digital records on the location and movement of every vehicle with a license plate, Affixed to police cars, bridges or buildings, the scanners capture images of passing or parked vehicles and note their location, uploading that information into police databases. Departments keep the records for weeks or years, sometimes indefinitely.

As the technology becomes cheaper and more ubiquitous, and federal grants focus on aiding local terrorist detection, even small police agencies are able to deploy more sophisticated surveillance systems. While the Supreme Court ruled in 2012 that a judge’s approval is needed to track a car with GPS, networks of plate scanners allow police effectively to track a driver’s location, sometimes several times every day, with few legal restrictions. The ACLU says the scanners assemble what it calls a “single, high-resolution image of our lives.”

“There’s just a fundamental question of whether we’re going to live in a society where these dragnet surveillance systems become routine,” said Catherine Crump, a staff attorney with the ACLU. The civil rights group is proposing that police departments immediately delete any records of cars not linked to a crime.

Law enforcement officials said the scanners can be crucial to tracking suspicious cars, aiding drug busts and finding abducted children. License plate scanners also can be efficient. The state of Maryland told the ACLU that troopers could “maintain a normal patrol stance” while capturing up to 7,000 license plate images in a single eight hour shift.

“At a time of fiscal and budget constraints, we need better assistance for law enforcement,” said Harvey Eisenberg, chief of the national security section and assistant U.S. attorney in Maryland.

Law enforcement officials also point out that the technology is legal in most cases, automating a practice that’s been done for years. The ACLU found that only five states have laws governing license plate readers. New Hampshire, for example, bans the technology except in narrow circumstances, while Maine and Arkansas limit how long plate information can be stored.

“There’s no expectation of privacy” for a vehicle driving on a public road or parked in a public place, said Lt. Bill Hedgpeth, a spokesman for the Mesquite Police Department in Texas, which has records stretching back to 2008, although the city plans next month to begin deleting files older than two years. “It’s just a vehicle. It’s just a license plate.”

In Yonkers, N.Y., just north of the Bronx, police said retaining the information indefinitely helps detectives solve future crimes. In a statement, the department said it uses license plate readers as a “reactive investigative tool” that is only accessed if detectives are looking for a particular vehicle in connection to a crime. “These plate readers are not intended nor used to follow the movements of members of the public.”

But even if law enforcement officials say they don’t want a public location tracking system, the records add up quickly. In Jersey City, N.J., for example, the population is only 250,000 but the city collected more than 2 million plate images on file. Because the city keeps records for five years, the ACLU estimates that it has some 10 million on file, making it possible for police to plot the movements of most residents depending upon the number and location of the scanners, according to the ACLU.

The ACLU study, based on 26,000 pages of responses from 293 police departments and state agencies across the country, also found that license plate scanners produced a small fraction of “hits,” or alerts to police that a suspicious vehicle has been found. In Maryland, for example, the state reported reading about 29 million plates between January and May of last year. Of that amount, about 60,000 — or roughly 1 in every 500 license plates — were suspicious. The No. 1 crime? A suspended or revoked registration, or a violation of the state’s emissions inspection program accounted for 97% of all alerts.

Eisenberg, the assistant U.S. attorney, said the numbers “fail to show the real qualitative assistance to public safety and law enforcement.” He points to the 132 wanted suspects the program helped track. They were a small fraction of the 29 million plates read, but he said tracking those suspects can be critical to keeping an area safe.

Blah. Blah. Blah.

When will the American people wake up to the realization that, by forfeiting our freedom and our privacy to Big Brother in exchange for the elusive promise of “security,” we have made a Faustian bargain?


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on July 18, 2013, 02:02:24 pm
There’s no expectation of privacy” for a vehicle driving on a public road or parked in a public place, said Lt. Bill Hedgpeth, a spokesman for the Mesquite Police Department in Texas, which has records stretching back to 2008, although the city plans next month to begin deleting files older than two years. “It’s just a vehicle. It’s just a license plate.”

And that is where they legally can do it. How is it any different from an officer sitting on the side of the road, writing down by hand vehicle descriptions, or even just sitting there observing the traffic? It isn't. It's effectively the same thing.

The key is "public roads". And the other legal part is the driver's license, which every person who has one has legally agreed to abide by the laws governing the use of public roadways. Law enforcement has the right to observe the public, in public, without a warrant, and official "public" roadways are legally "in public", thus no expectation of privacy.

That said, it shows the hypocrisy of government as they say it's public and legal for them to observe the public, in public, but how many times has police arrested people for observing police, in public? Many times. Police can take a dash cam image of you and your vehicle, but police have an attitude that you can't film police at work in public!

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on September 27, 2013, 04:26:20 am
TSA To Roll Out “Covert Surveillance” Vans

In another indication of how the TSA is expanding its turf way beyond airport security, the federal agency is about to roll out high-tech vehicles that will utilize secret technology to conduct “covert surveillance operations” in cities around the country.

According to a synopsis posted on the Federal Business Opportunities website (PDF), the TSA is set to purchase technology to retrofit three vans in Arlington, VA, Chicago, IL, and San Francisco, CA in order to convert them into surveillance vehicles that will “conduct covert surveillance operations in the course of investigations.”

Precisely where such covert surveillance will take place is not mentioned, although in 2010 it was revealed that US government agencies were already using roving street surveillance vans that deployed backscatter x-ray vision technology to inspect other vehicles.

In 2011, the Electronic Privacy Information Center also revealed plans for the Department of Homeland Security and the TSA to roll out mobile surveillance vans that had long-distance X-ray capability and eye movement tracking.

TSA Visible Intermodal Prevention and Response (VIPR) teams are responsible for around 10,000 checkpoints every year in the US, and have expanded from airports to bus & train terminals and even highways despite the fact that there is “no proof that the roving viper teams have foiled any terrorist plots or thwarted any major threat to public safety,” according to the L.A. Times.

The total cost of outfitting just three vans with the covert surveillance technology will be a jaw-dropping $160,000 dollars.

Despite their tax dollars paying for such equipment, American citizens are not privy to any detailed information on what this surveillance system will actually entail.

The TSA vehicles will be fitted with Crime Point IP Network Surveillance technology. When attempting to access details of the technology via the Crime Point website, the user is met with the message, “Due to its sensitive nature, the product content on this website is restricted to law enforcement professionals and government agencies only,” and a password is required to go any further.

Although the general public is barred from scrutinizing specific details, the company says that it provides “covert outdoor video systems” that “incorporate the latest emerging technologies.”

Crime Point provides surveillance vans of its own but, like details of the surveillance systems, that information is also restricted.

The legality of the TSA conducting “covert surveillance” of Americans, whether it be at transport hubs or on highways, conflicts with the Fourth Amendment, which protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Kilika on September 27, 2013, 05:21:56 am
The TSA vehicles will be fitted with Crime Point IP Network Surveillance technology.

That tells a lot right there. An "IP network" has to do with the internet and how computers connect with each other over the internet or on a closed "intranet".

And just how might they conduct surveillance on an IP network from a van? Must be wireless, as in WIFI/Bluetooth-type technology.

And that means for many IP networks, TSA would have to break into the network, as most are password protected. Unfortunately, for many businesses, they aren't very technologically literate, so many don't have their networks secured and are open doors for anybody with a laptop. It's called "wardriving".

Once in the network, they can observe everything that goes on that network, and even access individual computers that are on that network. All you need is the IP address of a given pc, and your in. In the world of computer geeks, this stuff is child's play. And a thorough IT manager can detect the intrusions if they are paying attention, though they may not be able to identify who is doing the intruding, they can still eventually block them.

Without question, this kind of thing is unconstitutional, being conducted with a warrant. I think the test is in asking if the TSA can walk into a business or residence and help themselves to the computers without a warrant. No, they cannot, even though the government has managed to implement their bogus program of the FISA court, claiming they can search and apply for a warrant afterwards.

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on November 28, 2014, 08:58:44 am
#HappyTracksgiving : How your travels are tracked this holiday season

It’s that time again. We’re on the move -- feasting, sharing, shopping, giving thanks. And we are being tracked every step of the way. So here’s a quick guide to the state of the unblinking electronic eye, 2014 Holiday Edition.

Flying home? Every passenger on every flight is recorded on digital manifests. Every plane is tracked. And even before you board, airports are among the most intensively surveilled public spaces, full of cameras and other monitoring devices. Some airports even use tiny sensors hidden in lighting fixtures that, according to the New York Times, can spot long lines, read license plates and report “suspicious activity” to authorities.

Taking the train? All aboard for monitoring. Ticket transactions happen with computers – or online – typically with credit cards, making it easy to follow any passenger or all of them. Train stations, meanwhile, are nearly as camera-laden as airports.

Uber or Lyft? Smartphone-based car services collect massive amounts of precise data, including your name, cell number, starting point, ending point, pickup time, drop-off time and exact route. Plus, that same data is collected on every other rider as well, making it easy for those with access to the databases to analyze who is seeing whom, when, where and, with a bit of imagination, why.

Driving yourself? The web of surveillance is a bit looser here, but there are countless license plates readers on our highways, both fixed and mounted on government vehicles. Databases collect such information for easy sharing. Those handy electronic toll payment systems, such as EZ Pass, are tracking you too. Highway rest areas are heavy on the video monitoring. And likely coming soon: facial recognition systems.

Walking? Both our big cities and small towns increasingly are thick with surveillance cameras, including newer generations that can see for miles, with amazing precision. Then there’s the rising use of overhead surveillance, from airplanes, drones, and aerostats, those blimp-like craft floating above some border areas.

What about a horse on backwoods trails? Hot air balloon? Offroad mountain bike? Well, even if you manage to avoid the ground cameras and the drones, there’s still that pesky phone in your pocket. If you’ve flipped on location services for your iPhone, maybe so Google Maps can keep you from getting lost, Apple and Google both are getting location data from you. So are the operators of many others apps.

Too paranoid to use a smartphone? Even the oldest, dumbest flip phone has to communicate with cell towers in order to work, meaning Verizon or AT&T – and potentially the government – know what cell tower your phone is using and in some situations can remotely activate GPS systems. Location technology initially developed for 911 calls also can estimate how close you are to various towers, making it easier to home in on your exact coordinates. Altitude measurements – revealing what floor you are on -- are next.

The U.S. Marshals Service, meanwhile, is flying airplanes with surveillance gear that collects nearby cell signals, helping track fugitives, drug dealers and – whether intentionally or not – everyone else at the same time, according to the Wall Street Journal.

Bear in mind that all these systems operate passively, continuously, even if nobody is looking for you. If you are an actual target of the authorities – be it your government or somebody else’s -- there are even more powerful tools available. Surveillance companies sell malicious software to install on smartphones for tracking locations, browsing your e-mail and activating video cameras and microphones.

The latest cell phone tracking technology reportedly can find you in almost any country in the world, even without a court order or the help of the phone company.

And if you’re staying close to home, your local police may have an IMSI catcher – sometimes called a StringRay -- they can set up outside your home and business to collect your cell phone signals. With that, authorities can track all your communications and Internet traffic while getting a rough idea of your physical movements as well.

These are just the techniques that we know about. No doubt there are others in operation and still others in development.

So travel safe, smile for the cameras and enjoy a Happy Tracksgiving!

Or for the benefit of all those systems that now track the public mood on social media: #HappyTracksgiving! Please tweet out anything I’ve missed.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Christian40 on March 22, 2015, 11:22:07 pm
New York Police Begin Using ShotSpotter System to Detect Gunshots

"Under the guise of “protecting the citizenry” from “illegal gunfire”, cities all across America are installing hyper-invasive sound recording systems. Orwell’s worst nightmares from “1984” are coming to pass in 2015. New York City is the latest to roll out the system.

The American police state is rising rapidly, and will soon be complete. In Orwell’s 1094, he wrote this:

“Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power. Now you begin to understand me.”
Welcome to the Future

The New York Police Department has started using a detection system that pinpoints the location of gunfire and sends the information to law enforcement, the latest move to modernize the nation’s largest police force, the department announced on Monday.

“Today, we are rolling out cutting edge technology to make the city safer, to make our neighborhoods safer, to keep our officers safer,” said Mayor Bill de Blasio, who appeared with William J. Bratton, the police commissioner, to announce the initiative. “This gunshot detection system is going to do a world of good in terms of going after the bad guys.”

The system, called ShotSpotter, is used in several major cities. It works by installing sensors — basically, sensitive microphones — around an area to pick up sounds from the street that might be gunfire, and uses the sensors to locate where the shots were fired. It then sends the information to the Police Department.

As part of a pilot program, ShotSpotter sensors are being placed in seven precincts in the Bronx and 10 in Brooklyn, a total area of 15 square miles, where there have been a high number of shootings. The sensors in the Bronx began working shortly after midnight on Monday, and sent data on shots fired at 12:49 a.m. The sensors in Brooklyn will start collecting data shortly after midnight next Monday."


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on June 30, 2016, 05:55:19 pm
Google My Activity shows everything that company knows about its users – and there’s a lot
The new site collects every website you’ve been on, everything you’ve searched and many of the things you’ve done with your phone

Google has launched a new site that shows absolutely everything it knows about its users. And there’s an awful lot of it.

The new My Activity page collects all of the data that Google has generated by watching its customers as they move around the web. And depending on your settings that could include a comprehensive list of the websites you’ve visited and the things you’ve done with your phone.

Google has long allowed its users to see the kinds of information that is being generated as people use the company’s products, including letting people listen in on automated recordings that it has made of its users. But the new page collects them together in a more accessible – and potentially more terrifying – way than ever before.

The page shows a full catalogue of pages visited, things searched and other activity, grouped by time. It also lets people look at the same timeline through filters – looking at specific dates, which go all the way into the past, and specific products like Google search, YouTube or Android.

When users open up the page for the first time, pop-ups make the case for why it has been launched and why Google collects quite so much data. You can use the site to “rediscover the things you’ve searched for, visited and watched on Google services” and help “delete specific items or entire topics”.

All of the information that’s used is how Google uses its ads services. By tracking people around the internet it can tailor those ads – but people can use the same site to opt out from the tracking entirely, or just delete information that they would rather wasn’t used for advertising.

Users aren’t automatically opted into the interest-based advertising tools, despite heavily rolling out the feature. The site asks people instead to turn it on – encouraging people to do so because it makes adverting more helpful and muting any specific ads that people don’t want to see.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on July 05, 2016, 05:36:46 pm
Shops set to spy on us by tracking our smartphones: Scanners will collect information on how many people pass in bid to try and revive the High Street

Scanners will be placed in stores to track customers through smartphones
Idea is that the information could help to revive dying high street shops
1,000 sensors will be installed in 81 towns and cities around the country
Campaigning group fear that such surveillance systems are open to abuse

Scanners are to be placed outside stores from Pret a Manger to Aldi to track people through their smartphones’ wifi signals.

One thousand of the sensors will be used to measure the numbers passing or entering, known as footfall.

The idea is that the information could help revive dying high streets threatened by the rise of internet shopping.

It could lead to changes in bus timetables to make shopping visits easier, or identify times of the day when free parking would help retailers. In theory, it could even be used to decide that some town centres are beyond saving.

But the idea that shoppers will be tracked through their phones’ wifi signals is controversial. Many balk at the rise of the surveillance society through CCTV cameras, automatic number plate recognition and smartphones.

The campaigning group Big Brother Watch warned that many people do not realise they are being scanned in this way and that such surveillance systems are open to abuse.

The team running the project, however, insists all the information will be made anonymous, removing any possibility of the data being linked to a specific individual. And shoppers can opt out by choosing to turn off wifi signals on their phones.

The SmartStreetSensor Project is funded by the Government’s Economic and Social Research Council.

The retailers so far signed up to take part include Pret a Manger, Aldi, Oxfam, Pizza Hut, Superdrug, Thorntons, Dixons Carphone, Patisserie Valerie, Jack Wills, Tortilla, The Entertainer, Eurochange, Itsu, and Ed’s Easy Diner.

The 1,000 sensors that will be placed in 81 towns and cities around the country have been developed in a partnership between the Local Data Company (LDC), which tracks the health of high streets, and University College London.

Data from LDC shows that major chains closed 1,043 high street stores in 2015, while independent traders opened 593.

LDC said the scanners will help to answer questions about which stores get the most visitors, identify which towns are losing most shoppers, and show whether the arrival of coffee shop chains provides a boost.

The retailers involved in the study will be able to see the flow of shoppers to particular locations and could use the information to identify busy times when stores can try different ways to get people through the door, for example by using window promotions.

Renate Samson, chief executive of Big Brother Watch, said these kinds of scanning systems are open to abuse.

‘None of us really understand what our phones are connecting to when we are in the street, on the Tube or in shopping centres,’ she added.

‘There have been plenty of studies to show these open wifi connections on smartphones mean that you can almost plot an individual’s movements right back to their home.

‘It is a real concern that people will not know they are being scanned through the wifi on their phones. If they don’t know that it is happening, how can they choose to opt out by turning it off?
‘It would be a good idea to send people a message on their phone to let them know that this is going on and telling them that they can opt out by turning off the wifi.’

Professor Paul Longley, director of the ESRC Consumer Data Research Centre at UCL, defended the project. He said: ‘The same data that can tell a retailer how footfall translates into sales at the till can also contribute to a far better understanding of how people move around Britain’s towns and cities.’

Andrew an 'Unconvincible' visits Aldi and is impressed


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on March 07, 2017, 02:57:56 pm
Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

According to documents inside the cache, a CIA program named “Weeping Angel” provided the agency’s hackers with access to Samsung Smart TVs, allowing a television’s built-in voice control microphone to be remotely enabled while keeping the appearance that the TV itself was switched off, called “Fake-Off mode.” Although the display would be switched off, and LED indicator lights would be suppressed, the hardware inside the television would continue to operate, unbeknownst to the owner. The method, co-developed with British intelligence, required implanting a given TV with malware—it’s unclear if this attack could be executed remotely, but the documentation includes reference to in-person infection via a tainted USB drive. Once the malware was inside the TV, it could relay recorded audio data to a third party (presumably a server controlled by the CIA) through the included network connection.

Wikileaks said its cache included more than 8,000 documents originating from within the CIA and came via a source, who the group did not identify, who was concerned that the agency’s “hacking capabilities exceed its mandated powers,” and who wanted to “initiate a public debate” about the proliferation of cyberweapons. Wikileaks said the documents also showed extensive hacking of smartphones, including Apple’s iPhones; a large library of allegedly serious computer attacks that were not reported to tech companies like Apple, Google, and Microsoft; malware from hacker groups and other nation-states, including, Wikileaks said, Russia, that could be used to hide the agency’s involvement in cyberattacks; and the growth of a substantial hacking division within the CIA, known as the Center for Cyber Intelligence, bringing the agency further into the sort of cyberwarfare traditionally practiced by its rival the National Security Agency.

The smart TV breach is just the latest example of a security problem emerging from the so-called “Internet of Things,” the increasingly large catalog of consumer products that include (or require) an internet connection for contrived “smart” functionality. Last year, the Guardian reported that Director of National Intelligence James Clapper told the Senate that breaching smart devices was a priority for American spies: “In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.”

Security and cryptography researcher Kenneth White told The Intercept that smart TVs are “historically a pretty easy target” and “a pretty great attack platform,” given that TVs are typically located in a living room or bedroom.” White added that “there is zero chance the [CIA has] only targeted Samsung. It’s just too easy to mod other embedded OSes” found in the smart TVs sold by every other manufacturer.

This new Wikileaks dump contains no apparent information about who exactly was targeted by Weeping Angel, or when. It’s also unclear how many models of Samsung TVs were vulnerable to Weeping Angel — the CIA documents published by Wikileaks only mention one model, the F8000 (albeit a very popular and well-reviewed model: Engadget described it as “the best smart TV system you’ll find anywhere.”) After privacy concerns about Samsung’s TV voice recognition feature spread in 2015, the company released an FAQ meant to soothe worried consumers. Addressing the question of “How do I know it’s listening or not?,” Samsung assured users that “If the TV’s voice recognition feature is turned on for a command, an icon of a microphone will appear on the screen,” but “if no icon appears on the screen, the voice recognition feature is off.”

This assurance about displayed icons is of course worth nothing if the CIA has hijacked the TV. What Samsung seems to have taken for granted was that the company, and its customers, could fully control the operation of its televisions. As the CIA’s Fake-Off exploit shows, the company’s assurances to consumers that a TV’s voice recognition controls would operate in a transparent manner do not hold true once spies and (potentially other hackers) get involved.

Samsung did not immediately return a request for comment. A CIA spokesperson replied “We do not comment on the authenticity or content of purported intelligence documents.”


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on March 08, 2017, 05:11:02 pm
Huge False Flag By The CIA Against Americans, Just Exposed By WikiLeaks

- The UMBRAGE Program Allows The CIA To Plant Digital 'Fingerprints' To Blame Other Countries For Attacks

(http://allnewspipeline.com/images/ciaRussianHackers1.jpg)  :D

While Stefan Stanford touched on some very troubling aspects of the recent WikiLeaks document dump on the CIA and their spying tools in his most recent article, looking back at the Obama administration's claims that "Russia" hacked the election, influencing voters for an outcome Obama himself fought against, claiming that the intelligence community had evidence (which they never produced) of Russia's cyber "fingerprints," Wikileaks may have just exposed what may very well be a huge "false flags," carried out by the CIA, with the help of the mainstream media,  against Americans.


A simple search using any search engine brings up literally hundreds of pages of MSM reports discussing the 2016 election, how Russia's "fingerprints" were all over it, but Washington Post consistently cited "CIA" sources for their bombshell "news", such as one from December 2016 titled "Secret CIA assessment says Russia was trying to help Trump win White House," with each story automatically assuming that Russia influenced the election because the intel community said so, because they traced it all back to Russia's cyber fingerprints. (Note that WAPO never offers a disclaimer informing their readers that WAPO owner Jeff Bezos has ties with the CIA via a $600 million contract.)

It wasn't just the Washington Post that reported "Russian" interference as if it were a foregone conclusion, but all the mainstream media did so, citing unnamed U.S. officials claiming "Russian ‘digital fingerprints’ all over election hacks," with the following quote from Fox 8 (citing a CNN report) being representative of the consistent reporting since the November election:

One official told CNN the administration has traced the hack to the specific keyboards — which featured Cyrillic characters — that were used to construct the malware code, adding that the equipment leaves “digital fingerprints” and, in the case of the recent hacks, those prints point to the Russian government.

At the same time that the CIA led intel community was asserting Russian "fingerprints" were all over the election, Washington Post dropped another bombshell (which they changed, added a correction, then followed up by writing another article which basically retracted the fake news" story some "intel" official fed them) claiming Russia hacked into the U.S. power grid!

Once again, they claimed that "A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials."

The initial story was quoted all over the Internet, the retraction in the subsequent article was mostly ignored by those that jumped on the "Russia hacked the grid" story, and once again, the pattern that has been used throughout the past months was an "unnanmed source" found "Russian code," which of course allows them to conclude "Russian fingerprints", meant Russia was responsible.


Part of the WikiLeaks "Vault 7: CIA Hacking Tools Revealed," includes a specific section they highlighted on their Twitter page, detailing a program called "UMBRAGE" which exposed that the "CIA'S Remote Devices Branch's UMBRAGE Group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from."

Screen shot below:


On March 5, 2017, one day after President Trump accused the Obama administration of of tapping his communications before the election, Trump tweeted "Is it true the DNC would not allow the FBI access to check server or other equipment after learning it was hacked? Can that be possible?"


Why yes, Mr. President, it is true, as evidenced by multiple outlets that reported the DNC refused the FBI access to their servers to make an independent determination after investigating.

The FBI has spent months trying to persuade people that Russia was behind the DNC hack, but we're now learning that it didn't get much help from the DNC itself. The Bureau tells Buzzfeed News that the Democrats' organization reportedly "rebuffed" multiple requests for physical access to the hacked servers, forcing investigators to depend on the findings of the third-party security firm CrowdStrike (which the DNC contacted after the hack). The FBI would have tackled the breach earlier if the DNC hadn't "inhibited" the investigation, according to its statement.

How did the Obama administration, the intelligence community, and the MSM justify accusing Russia of being behind the DNC and the Clinton campaign hacks? "Fingerprints."

Another U.S. official told CBS News that the Obama administration believes Russian state actors are behind the leak, confirming the hackers "left all kinds of fingerprints."

Entrepreneur, Innovator, Gamer, Artist, Internet Freedom Fighter, KimDotCom, pretty much sums up what this portion of the Wikileaks revelations tell us, when he states, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE."




Following the #CIAHacking and #Vault7 Twitter hashtags this morning, the following meme caught my eye because it ran parallel to what I was thinking and researching as part of the article.


That is a question I was wondering yesterday while watching the amount of information WikiLeaks exposed about the CIA and their level of spying on Americans, but specifically on how WikiLeaks has just exposed their UMBRAGE program where they can basically plant anyone's digital "fingerprints," in order to accuse that someone of anything they want, in order to manipulate the American public into believe a false narrative.

Seems they aren't spinning, they are simply ignoring the information WikiLeaks exposed by attempting to manipulate their readers into thinking the only important thing is "who is the leaker" that gave WikiLeaks all the information.

Looks like the CIA gave their puppets over at Washington Post their marching orders and the preferred narrative as the WAPO headlines with "FBI prepares for new hunt for WikiLeaks’ source," and after reading it, we note there is not one mention of what WikiLeaks exposed, nor the UMBRAGE program, nor the level of surveillance the CIA conducts on all Americans via their electronics. Just the attempt to only focus on the  "who" is behind the leaks and what they mean for the intelligence community.

So I virtually marched over to the New York Times to see what type of spin they decided on, had to do a word search on their front page just to find the mention of WikiLeaks on it, and all the way at the bottom in the "technology" category, they had two pieces, one titled "With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?" and another "WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies."

Nothing from either on UMBRAGE and how the CIA creates "false flag" attacks using the "fingerprints" and malware they keep in their library to frame other countries.

Zip. Nada. Nothing.

Why? Well let me take a guess, perhaps because it completely unravels the narrative they have been shoving down their readers' throats that Russia hacked the DNC and the Clinton campaign, which somehow "influenced" the 2016 presidential election?

Flashback: This is an old clip showing admittance of the CIA that they use the mainstream media to manipulate the thoughts and ideas of American citizens in the USA.


Not only is the CIA spying on Americans at unprecedented levels, they are actively carrying out false flag operations against the American people to manipulate their opinions, as they have been doing throughout their history.

In this case, it is extremely likely they have been attempting to frame Russia for election interference, basically playing chicken with another nuclear power, which could have very well led to a World War and the mainstream media has been complicit every single step of the way.



Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on March 08, 2017, 05:31:51 pm
Watched by the 'Weeping Angels': How Samsung TV viewers were 'recorded via their sets by British and US spies who hacked into devices with a virus named after eerie Doctor Who villains'

Site published 8,761 secret US government files detailing hacking techniques
It was called 'Weeping Angel' -  after stone statue killer monsters from Dr Who
WikiLeaks claims documents show CIA can bug your TV and control your car
Among files was US-UK operation which showed how to turn TV into spy device
Instructions said TV could be switched off but actually used to monitor targets

British spies helped the CIA find a way to convert 'smart' TVs into secret microphones using a codename inspired by Doctor Who killer monsters called 'Weeping Angels'.
MI5 worked with their US counterparts to develop software that convinced people their sets were switched off when in fact they were on and recording every word they say.
British spies has been central to developing the hack of TVs connected to the internet, according to WikiLeaks.
The spooks also chose to name it after to Weeping Angels from Doctor Who - monsters who pretended to be stone statues before creeping up on unsuspecting victims.
US intelligence has also devised a method of remotely controlling cars and crashing them, leaked data claims.

Read more: http://www.dailymail.co.uk/news/article-4290926/British-spies-linked-CIA-WikiLeaks-reveals.html#ixzz4amRMveGb

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on March 08, 2017, 05:42:20 pm
CIA can and does hack almost EVERY device: Giant WikiLeak of agency's secrets reveals it infiltrates iPhones, smart TVs and Whatsapp and can even take over self-driving cars which could be programmed to kill
WikiLeaks published 8,761 documents and files claiming to be from the CIA's Center for Cyber Intelligence on Tuesday
Leak details information on how CIA-developed malware can target iPhones, Android phones and smart TVs
WikiLeaks alleges some remote hacking programs can turn electronic devices into recording and transmitting stations to spy on targets
Documents also claims the CIA can bypass encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking smartphones
CIA investigated hacking control systems in cars and trucks, which would allow agency to engage in nearly undetectable assassinations

Read more: http://www.dailymail.co.uk/news/article-4289942/WikiLeaks-publish-1000s-says-CIA-documents.html#ixzz4amTvpDVE
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on March 08, 2017, 06:24:27 pm
Government Spooks Can Use The Mic And Camera On Trump’s Phone Even When He Thinks It Is Turned Off

After reading this article you might not ever view your electronic devices the same way again.  Last year, Hollywood released a biographical political thriller based on the life of Edward Snowden that had one particularly creepy scene.  In that scene, a government spook used a program to remotely activate the microphone and camera on a laptop, and by doing so he was able to watch a woman as she got undressed.  Sadly, as you will see below, this kind of thing is happening constantly.  Any digital device can potentially be accessed and used to spy on you even if it appears to be turned off.  And this is why Donald Trump needs to be so careful right now, because the intelligence community wants to take him down and they can literally use any digital device in his possession to try to gather dirt on him.  We have a “deep state” that is absolutely obsessed with watching, tracking and monitoring the American people, and something desperately needs to be done about this unconstitutional surveillance.  Now that Trump has become greatly upset about how the government was tapping into his phone calls, maybe something will finally get accomplished.

In an article that I just published on The Most Important News, I talked about the NSA’s brand new two billion dollar data storage facility in Utah that can store up to five zettabytes of data.  Secret “electronic monitoring rooms” embedded within the facilities of major communications companies across the United States send an endless flow of digital information to this facility, and most Americans have no idea that this is even happening.  The following comes from Wired…

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits.

Whistleblowers have come forward again and again to warn us about what was happening, but they have largely been ignored.  One of the most prominent whistleblowers was former NSA employee William Binney…

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there.

Can you imagine recording 320 million phone calls a day?

And that was at the beginning of the program – I can’t even imagine what the number must be these days.

But even if you aren’t using your phone government spooks can still potentially be listening to you.  The following comes from a CNN article entitled “How the NSA can ‘turn on’ your phone remotely“…

Government spies can set up their own miniature cell network tower. Your phone automatically connects to it. Now, that tower’s radio waves send a command to your phone’s antennae: the baseband chip. That tells your phone to fake any shutdown and stay on.

A smart hack won’t keep your phone running at 100%, though. Spies could keep your phone on standby and just use the microphone — or send pings announcing your location.

John Pirc, who did cybersecurity research at the CIA, said these methods — and others, like physically bugging devices — let the U.S. hijack and reawaken terrorists’ phones.

Unfortunately, these tactics are not just used against “terrorists”.

The truth is that these tactics are employed against anyone that the NSA is interested in, and in fact they could be listening to you right now.

Thanks to Edward Snowden, we have learned quite a bit about how the NSA takes over digital devices…

The latest story from the Edward Snowden leaks yesterday drives home that the NSA and its spy partners possess specialized tools for doing exactly that. According to The Intercept, the NSA uses a plug-in called GUMFISH to take over cameras on infected machines and snap photos.

Another NSA plug-in called CAPTIVATEDAUDIENCE hijacks the microphone on targeted computers to record conversations.

Intelligence agencies have been turning computers into listening devices for at least a decade, as evidenced by the Flame spy tool uncovered by Kaspersky Lab in 2012, which had the ability to surreptitiously turn on webcams and microphones and perform a host of other espionage operations.

So what can you do to prevent this from happening?

If you have external webcams and microphones, you can unplug them when they are not in use.

If you have a built-in camera, some have suggested covering the camera with a sticker.

And of course pulling out the battery entirely will prevent someone from taking over your phone when you are not using it.

But at the end of the day, it is going to be really hard to keep government spooks out of your electronic devices completely.  They have become extremely sophisticated at using these devices to get what they want, and they will literally go after just about anyone.

For example, just consider what they did to former CBS reporter Sharyl Attkisson.  In her recent book, she details a campaign of digital harassment that sounds like something out of a spy novel.  The following comes from the Washington Post…

The breaches on Attkisson’s computer, says this source, are coming from a “sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA).” Attkisson learns from “Number One” that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the “intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool.”

To round out the revelations of “Number One,” he informs Attkisson that he’d found three classified documents deep inside her operating system, such that she’d never know they were even there. “Why? To frame me?” Attkisson asks in the book.

If they can do all of that to Sharyl Attkisson, they can do it to Donald Trump too.

Trump needs to understand that the deep state is trying to destroy him, and that everything that he says and does is being monitored.

So until Trump can completely clean house at all of our intelligence agencies, he is going to have to be extremely careful 24 hours a day.

And let us hope that Trump is ultimately victorious in his struggle against the deep state, because the future of this nation is literally hanging in the balance.


Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Psalm 51:17 on April 12, 2017, 05:45:07 pm

Cops use chopper to nab teens suspected of stealing candy from Canada's Wonderland


TORONTO -- The great Canadian candy caper ended in a helicopter copter bust of the alleged culprits.

Police north of Toronto used a helicopter and thermal imaging to catch the alleged thieves after someone broke into a store at Canada's Wonderland late Saturday and stole some treats.

"Police were called by Canada's Wonderland security, who had spotted three people within the closed park," York regional police said in a release on Tuesday. "The males were seen dressed in dark clothing, with their faces covered, entering one of the stores on the property and stealing candy."''

 The teens then left the store, and disappeared in the amusement park, police said.

The police helicopter "Air2" was deployed, arriving on the scene shortly after. Using a special infra-red camera, officers located the suspects hiding under a tree. Officers aboard the chopper directed members of the canine unit on the ground to the area.

"OK, I've got some contacts, they're at the south end of the park," one officer can be heard saying. "I've got two, maybe three people huddled down underneath a tree."

The night-time video shows the accused as bright white in the otherwise grey dark as four officers and the dog track them down.

With the dog leading the way, police were able to locate the suspects and take them into custody without further incident.

"There's three and they're all surrendering," the officer aboard the chopper tells dispatch.

Two of the arrested teens were aged 16 years old and the third was 15, police said. All were from Vaughan, Ont.

"The youths were co-operative with police and were remorseful for their actions," the statement said. "They were each released to the custody of their parents."

Police released a 65-second video of incident as captured by the chopper "as a deterrent to anyone that is considering trespassing onto private property."

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Psalm 51:17 on July 17, 2017, 04:16:35 pm
Facial Recognition Coming To Police Body Cameras As Artificial Intelligence And Machine Learning Takes Over
Italian-born neuroscientist and Neurala founder Massimiliano Versace has created patent-pending image recognition and machine learning technology. It’s similar to other machine learning methods but far more scalable, so a device carried by that cop on his shoulder can learn to recognize shapes and — potentially faces — as quickly and reliably as a much larger and more powerful computer. It works by mimicking the mammalian brain, rather than the way computers have worked traditionally.


An approach to machine learning inspired by the human brain is about to revolutionize street search. Even if the cop who pulls you over doesn’t recognize you, the body camera on his chest eventually just might.

Device-maker Motorola will work with artificial intelligence software startup Neurala to build “real-time learning for a person of interest search” on products such as the Si500 body camera for police, the firm announced Monday.

Italian-born neuroscientist and Neurala founder Massimiliano Versace has created patent-pending image recognition and machine learning technology. It’s similar to other machine learning methods but far more scalable, so a device carried by that cop on his shoulder can learn to recognize shapes and — potentially faces — as quickly and reliably as a much larger and more powerful computer. It works by mimicking the mammalian brain, rather than the way computers have worked traditionally.
Motorola Solutions Neurala AI at the Edge:

Versace’s research was funded, in part, by the Defense Advanced Research Projects Agency or DARPA under a program called SyNAPSE. In a 2010 paper for IEEE Spectrum, he describes the breakthrough. Basically, a tiny constellation of processors do the work of different parts of the brain — which is sometimes called neuromorphic computation — or “computation that can be divided up between hardware that processes like the body of a neuron and hardware that processes the way dendrites and axons do.” Versace’s research shows that AIs can learn in that environment using a lot less code.

Decreasing the amount of code needed for image recognition means a lot less processing, which means smaller computers needing less power can accomplish these tasks. Eventually, you get to the point where a computer the size of a body camera can recognize an image that camera has been told to look for, or at least do a lot more of the “learning” required to make the match.

“This can unlock new applications for public safety users. In the case of a missing child, imagine if the parent showed the child’s photo to a nearby police officer on patrol. The officer’s body-worn camera sees the photo, the AI engine ‘learns’ what the child looks like and deploys an engine to the body-worn cameras of nearby officers, quickly creating a team searching for the child,” Motorola Solutions Chief Technology Officer Paul Steinberg said in a press release.

Neurala and Motorola hope to demonstrate the capability on a prototype device at some point.

At least one Motorola competitor — Axon, formerly Taser — which also makes body cameras for cops, is also looking to integrate on-camera artificial intelligence into future products. source

Title: Re: 14 Incredibly Creepy Surveillance Technologies
Post by: Mark on June 04, 2018, 07:02:41 pm
The Department Of Homeland Security Plans To Compile A List Of All Bloggers, Journalists And “Social Media Influencers”

Many were hoping that once Barack Obama was out of office we would see less of this Big Brother surveillance nonsense, but instead it seems to be getting even worse.  In fact, the Department of Homeland Security has just announced that it intends to compile a comprehensive list of hundreds of thousands of “journalists, editors, correspondents, social media influencers, bloggers etc.”, and collect any “information that could be relevant” about them.  So if you have a website, an important blog or you are just very active on social media, the Department of Homeland Security is going to put you on a list and will start collecting information about you.  The DHS has already announced that it will hire a contractor to aid in monitoring media coverage, and they will definitely need plenty of help because it is going to be a very big job…

    As part of its “media monitoring,” the DHS seeks to track more than 290,000 global news sources as well as social media in over 100 languages, including Arabic, Chinese and Russian, for instant translation into English. The successful contracting company will have “24/7 access to a password protected, media influencer database, including journalists, editors, correspondents, social media influencers, bloggers etc.” in order to “identify any and all media coverage related to the Department of Homeland Security or a particular event.”

    “Any and all media coverage,” as you might imagine, is quite broad and includes “online, print, broadcast, cable, radio, trade and industry publications, local sources, national/international outlets, traditional news sources, and social media.”

If this sounds extremely creepy to you, that is because it is extremely creepy.

I run several prominent websites including The Most Important News and The Economic  Collapse Blog, and so without a doubt I will be on this list.  And if I was just a name on a list in some database somewhere, that would be bad enough, but instead it sounds like the DHS will be collecting any “information that could be relevant” about all of us…

    As Gizmodo noted, the DHS’ vagueness is also a concern. It leaves itself an opening for collecting “any other information that could be relevant” about these influencers, and there’s no hint as to what that could be. Is it strictly functional information like work histories, or sensitive data that could be abused? Either way, the database could be troublesome for bloggers and social media stars who aren’t usually under such close government scrutiny.

This is one of the reasons why I wanted to get to Washington.  This kind of Orwellian monitoring of our freedoms is unnecessary, it is a colossal waste of taxpayer dollars, and it violates our most basic freedoms.

So why does the Department of Homeland Security need to do this?

The explanation that they are giving the public is extremely week.  The following comes from Forbes…

    DHS says the “NPPD/OUS [National Protection and Programs Directorate/Office of the Under Secretary] has a critical need to incorporate these functions into their programs in order to better reach Federal, state, local, tribal and private partners.” Who knows what that means, but the document also states the NPPD’s mission is “to protect and enhance the resilience of the nation’s physical and cyberinfrastructure.”

But we are not supposed to ask questions about government programs such as this.

In fact, just a few days ago a Department of Homeland Security representative stated that those that are questioning this program are “tinfoil hat wearing, black helicopter conspiracy theorists“…

    If you find yourself skeptical of this proposal of mass state monitoring of the press, consider yourself a bonafide member of the “tinfoil hat wearing, black helicopter conspiracy theorists,” DHS representative Tyler Houlton said Friday. It’s all very routine, he argued, casting the project as an innocent means of “monitoring current events.” Just shut up and let us do this, crackpots.

That kind of response should make all of us very angry.

If the government is going to monitor us and put our information in a database, we should have the right to ask questions.

Freedom of speech is one of our most foundational rights, and many are concerned that “monitoring and tracking” are initial steps that could lead to a significant crackdown on Internet activity.  Just check out what is about to happen over in Europe.  The Internet has made it possible for ordinary people to communicate with one another on a massive scale, and any efforts by national governments to interfere with that must be greatly resisted.

Unfortunately, it appears that this new Department of Homeland Security program is moving ahead rapidly.  In fact, it is being reported that seven different companies have “already expressed interest” in participating…

    Seven companies, mainly minority- or women-owned small businesses, have already expressed interest in becoming a vendor for the contract, according to the FedBizOpps web site.

All it takes for evil to flourish is for good men to be nothing.  Please spread word about this creepy new surveillance program to everyone that you know, because what they are doing is not right.