Many are talking about future plans to install RFID's inside human bodies or ID cards in order to be able to track each person's activities. Talks about a big brother conspiracy to monitor each person's activities.
But, here I prove you that soon the majority of the 21st century citizens of this planet will soon carry RFID's with them anywhere they go to the point that if secret government organizations really want to know their whereabouts, will not only be able to track their locations, but also what they had for lunch, how many times cheated on their spouses, if they are attracted to child pornography & potentially a pedophile, what's their favorite food, their political and social interests and so on.
While many would argue that the US government"s monitoring citizen's private activities violates their privacy, I believe that it's in the best of our national security interests because they mainly have anti-terrorism usage and may barely even be used to investigate low profile criminal activities.
Almost any person in America owns a cell phone and most new generations of mobile phone devices have GPS capabilities. Now by tracking your facebook, twitter, myspace. email accounts and other social networking accounts, they could monitor what ever you are doing during your daily activities.
AT&T and other companies have signed an agreement with the government to have a special section for monitoring call, text and internet activities of their users. There are also classified agreements with Google, Yahoo, MS and other top email providers that we would't know much about the details.
Google and Android powered cellphones for example, collect a database of your interests in order to be used to improve their marketing and that also includes the content of the emails you receive through your G-mail account.
There is also a reverse password lookup private company, founded by a former government intel employee that has contracts with the investigation companies to identify the suspects' other email, social networking, etc accounts through the ordinary mistakes people usually make, using a password related to some other account to access another one by mistake. His monitoring system collects the data from individuals' password entry and through a software locates their unknown accounts. The fact is that his system will not be possible without the email hosting companies' cooperation.
Locating or positioning touches upon delicate privacy issues, since it enables someone to check where a person is without the person's consent. Strict ethics and security measures are strongly recommended for services that employ positioning, and the user must give an informed, explicit consent to a service provider before the service provider can compute positioning data from the user's mobile phone.
In Europe, where most countries have a constitutional guarantee on the secrecy of correspondence, location data obtained from mobile phone networks is usually given the same protection as the communication itself. The United States however has no explicit constitutional guarantee on the privacy of telecommunications, so use of location data is limited by law.
With tolling systems, as in Germany, the locating of vehicles is equally sensitive to the constitutional guarantee on the secrecy of correspondence and thus any further use of tolling information beyond deducting the road fee is prohibited. That leads to the strange situation that even obviously criminal intent may not be interfered by such yet available technical means.
Officially, the authorities (like the police) can obtain permission to position phones in emergency cases where people (including criminals) are missing.
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. This works with or without locating. The technique is called a "roving bug," and was approved by top U.S. Department of Justice. A judge ruled that police use of such tracking in the USA will require a warrant showing probable cause.
The Electronic Frontier Foundation is tracking some cases, including USA v. Pen Register, regarding government tracking of individuals such as pedophiles and political activists.
The Fact is that most of us have been carring RFID chips for yaers know w/o realizing
Most of our cellular phones have GPS transmitters inside and all are a form of RFID sending a unique Radio Signal every mili-second. Each phone has its own registered IP and every other code specification by the Department of Homland Security. Also by making deal w/all cell phone carriers world-wide, it has gone beyound our boarders and also all new US visas have RFID'd inside of them
Six yars ago I has all my deliver truck drivers caring Nextel phones and I had all
know imagine using a small device connected to a network you could be even traced inside a metro tunnel.
Also all super markets, banks, train stations, etc are equipped with surveillance cameras and many of government agencies have direct access to their data. Through a coordination with credit processing companies, camera owners and government, they could make an image profile of each credit card holder without the person's knowledge and that could be used to monitor any future activity.
New 3d softwares allows a new system to convert any video image into a 3d profile that could be used to ID individuals. A while ago New York MTA proposed a plan to equip its stations with 3d imaging cameras as well as other state-of-the art surveillance systems.
Know immagine what kind of info about you a well programed software could provide since Gov has backdoor access to various networks and accounts. Eg. there using your Computer, Smart phone, etc IP address ID all your social, business and personal networking accounts, then all need to do to have few suspect's you knows types Identifyed and their network. The system automatically serches amoung thousands of records and lets say if you are associating w/a convicted/suspected drug dealer and two of your fiendes are associating you'll be automatically marked as a suspect.
Also to detect rapists, child molestors, terrorists they just need to rate and categorize the type of contents they view and trust me many of porn or sites promoting crimes, terrorism, etc are set by governments to locate suspects
Also many of spywares and tracking cookies are developed and installed by the intelligence organizations (there could be another person across the world watching the words I am typing now and capable of corrupting my network)
I've personally experienced many thins that could only relate to that. For example during Iran's protests I was one of the ones attacking Islamic Reppublic strongly and by logics convincing many of Mousavi supporters to turn the protest into a revolution against the dictator regime. Once I identified 5 of Iran/soy contractor hired by Iran. The moment I tried to expose them my entire DSL network got shot down and for 1-1/2 days even verizon couldn't solve the issue and had to reset everything from computer to modem to fix it. the next day I secured my fire wall and started to look for any strainge file
I had 2 remote parental controls installed out of no-where giving the instaler to monitor my activity remotely. Also spywares that i haven't been able t kill even w/upgraded software
And your voice is another story. Automotive speech recognition systems available to dept. of defense are so advanced, they could pick definitions of many words from different languages and accents. US Army has been recruiting thousands of individuals of any language and background, trainig them to become linguists and translators and they don't just work with the Army, they serve many other military and intelligence ....
Now imagine combining all the info they know from you into one single intelligent system.
Sunday, August 23, 2009
Subscribe to:
Posts (Atom)