Top Five Ways You Are Being Watched
What if somebody told you that you were being monitored inside and outside your home 24 hours a day? Would you believe them? Most people wouldnâ€™t. However reality is often scarier than fiction. Chances are if youâ€™re reading this, you likely live in a nation that utilizes the following tracking methodologies that have only one purposeâ€¦to digitally record and catalogue your every move.
For the past two decades, there has been a malevolent movement across industrialized nations to track individuals without their knowledge and with a total disregard for privacy.
Just two years ago,Â the Associated Press reportedÂ that 100,000 cell phone years were being secretly tracked outside of the United States. That first-of-its-kind study byÂ Northeastern UniversityÂ raised privacy and ethical questions for its monitoring methods, which were illegal at the time in the United States.
The scientists would not say where the study was done, only describing the location as an industrialized nation. Researchers used cell phone towers to track individualsâ€™ locations whenever they made or received phone calls and text messages over six months. In a second set of records, researchers took another 206 cell phones that had tracking devices in them and got records for their locations every two hours over a weekâ€™s time period.
The study was based on cell phone records from a private company, whose name also was not disclosed.
Spying by big brother and now international corporations is habitual across the globe. It can take on any form from listening to phone calls, intercepting wireless communications,Â infiltratingÂ protest groups, monitoring emails/internet usage, biometrics and many more. Agencies are increasingly connected through various information sharing measures, making it more likely that information collected on an individual by a small police department could end up in the hands of a lettered agencyâ€™s database such as the FBI or CIA.
According to the ACLUâ€™s recent report, we are living in a surveillance society where domestic surveillance and erosion of privacy standards are at an all time high.
Here are the top 5 ways you are being digitally monitored and tracked on a daily basis:
1) Computers and InternetÂ â€“ Internet browsers are recording your every click forming detailedÂ cookiesÂ and browsing sessions on your activities.Â The NSAÂ has been exposedÂ as having cookies on their site that donâ€™t expire until 2035.Â Major search engines knowÂ where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. Â IP addresses are collected and evenÂ made public.Â Controversial websites can be flaggedÂ internally by government sites, as well as re-routing all trafficÂ to block sitesÂ the government wants to censor. It has now been fully admitted that social networks such as facebook and twitter provide NO privacy to users, while technologies forÂ real-time social network monitoringÂ are already being used. Â TheCybersecurity ActÂ attempts to legalize the collection and exploitation of your personal information.Â Appleâ€™sÂ iPhoneÂ also has browsing data recorded and stored.Â All of this despite theÂ overwhelming oppositionÂ to cybersurveillance by citizens. The fact that laptops â€” contributed by taxpayers â€“Â spied on public school childrenÂ (at home) is outrageous.Â Years ago Google began officially to use computerÂ â€śaudio fingerprintingâ€ťfor advertising uses.Â They have admitted toÂ working with the NSA, the premier surveillance network in the world.Â PrivateÂ communications companiesÂ already have been exposed routing communications to the NSA.Â Now, keyword tools â€” typed and spoken â€” link to the global security matrix.
2) GPSÂ â€“ Global positioning chips are now appearing in everything fromÂ passports, to cars.Â More common uses includeÂ tracking employees, and for all forms ofÂ private investigation.Â Apple recently announced they are collecting theÂ precise locationÂ of iPhone users via GPS for public viewing in addition toÂ spying on usersÂ in other ways. Cell phoneÂ tracking via GPS and location privacy is starting to emerge as a big issue, especially with more GPS enabled cell phones on the market. MostÂ VOIP and e911 rules now require that your phone must be registered with your location data when you make a 911 call. However,Â many users are discovering that their GPS phones are transmitting their location 24 hours per day.
3) RFIDÂ Â â€“ It becomes unnervingly easy to imagine a scenario where everything you buy thatâ€™s more expensive than a Snickers will sport RFID tags, which typically include a 64-bit unique identifier yielding about 18 thousand trillion possible values.Â KSW-Microtec, a German company, has invented washable RFID tags designed to be sewn into clothing. And according to EE Times, the European central bank is considering embedding RFID tags into banknotes by 2005. RFIDÂ Â â€śproximity cardsâ€ťtake tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access.Â Latest developments include anÂ RFID powder developed by Hitachi, for which the multitude of uses are endless â€” perhaps including tracking hard currency so we canâ€™t even keep cash undetected. (Also see microchips below). VeriMed is the first and onlyÂ FDA-approved patient identification systemÂ that uses an implantable RFID microchip. Hewlett-Packard recently announced itâ€™s working onÂ a projectÂ it calls the â€śCentral Nervous System for the Earthâ€ť which will deploy a trillion sensors all over the planet.
4) BiometricsÂ â€“ The most popular biometric authentication scheme employed for the last few years has beenÂ Iris Recognition. The main applications are entry control,Â ATMsÂ and Government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in NationalÂ identification cards. Data from closed-circuit televisions mounted in a public spaces can feed into biometric software that uses a template to determine relative distances and relationships between various facial features. If the software matches the facial features from the live feed with those in any specific database, it can be recorded and archived for future use. There is currently no regulation anywhere in the world to protect the right of privacy for the features one shows in public. Admittedly used at political campaign events,Â sporting events, and most recently at theÂ G8/G20 protestsÂ in Canada, biometric facial recognition is also harvesting data fromÂ FacebookÂ images and surely will be tied into the street â€śtrafficâ€ť cameras.,
5) Blood, Body and DNAÂ â€“ Blood from babies has been taken for all people under the age of 38.Â In England, DNA was sent toÂ secret databasesÂ from routine heel prick tests. Â Several reports have revealed covertÂ Pentagon databasesÂ of DNA for â€śterroristsâ€ť and nowÂ DNA from all American citizensÂ is databased.Â Digital DNAÂ is now being used as well to combat hackers. The timeline for integratingÂ injectable nano-microchipsÂ inside of vaccines is speculative, but it could be just a few years, months or perhaps it is here and we already unaware of their integration within pharmaceuticals. Regardless, due to the many military and political advantages, their implementation is inevitable. Nanobot technology could just as easily be used to advance monitoring and biological weapons as they can to advance human health. dubious modalities are being modeled in neuroscience to make perpetrators of crimes accountable before they even commit these crimes.Â Dubious brain scanningÂ modalities are being modeled in neuroscience to make perpetrators of crimes accountable before they even commit these crimes.Â New security airport scannersÂ are so efficient they can pick up passengersâ€™ personal details such as breast and genital size. The hi-tech machines now installed in major airports worldwide are the subject of great controversy since the scanning technician is able to print, export, store or transmit the image.
All of this is leading to Predictive Behavior TechnologyÂ â€“ It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling.Â Itâ€™s been marketed for such uses asÂ blocking hackers.Â Things seem to have advanced to a point where a trulyÂ scientific Orwellian worldÂ is at hand.Â It is estimated that computers know to a 93% accuracy where you will be, before you make your first move. Â Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directlyinfluence behavior and decision making.
The more we refuse these invasive technologies, the greater the opportunity to defeat them and terminate their use. We must stand united and refuse to be scanned, tracked, traced, injected or recorded against our wishes. Further compliance by the public will only guarantee further restriction and corruption of our privacy and freedom.