FBI Plans to Enlist Local Cops Nationwide in Massive DNA Collection Scheme

FBI Plans to Enlist Local Cops Nationwide in Massive DNA Collection Scheme

dna-microscope

Remember that time the Supreme Court ruled that our DNA is basically just like our fingerprints, and cops can snatch it from us subsequent to arrest? Remember the giant biometrics project the FBI has been spending at least a billion dollars of our money building (with many of the details kept secret), called ‘Next Generation Identification’? With those powers and monies combined, the FBI this week announced its plans “to accelerate the collection of DNA profiles for the government’s massive new biometric identification database.” Like with other biometrics collection schemes, the FBI aims to get local police to do the groundwork.

What could go wrong?

NextGov:

Various FBI divisions “are collaborating to develop and implement foundational efforts to streamline and automate law enforcement’s DNA collection processes” including at arrest, booking and conviction, according to an Aug. 19 notice about the industry briefing. The ongoing groundwork is expected to facilitate the “integration of Rapid DNA Analysis into the FBI’s Combined DNA Index (CODIS) and Next Generation Identification (NGI) systems from the booking environment.”

CODIS is the government’s central DNA database.

Rapid DNA analysis can be performed by cops in less than two hours, rather than by technicians at a scientific lab over several days. The benefit for law enforcement is that an officer can run a cheek swab on the spot or while an arrestee is in temporary custody. If there is a database match, they can then move to lock up the suspect immediately.

While current law requires DNA sent to CODIS to be examined in an accredited lab, FBI officials are looking for a “legislative tweak” to enable local law enforcement to skip that step, and send arrestees’ DNA straight to the FBI’s national database. In 2011, one out of every 25 Americans was arrested.

EFF’s Jennifer Lynch, one of the nation’s foremost experts on FBI biometrics programs, explains why the bureau’s DNA plans pose a serious threat to civil liberties.

“If you leave something behind, let’s say your trash on the sidewalk out in front of your house, then you’ve abandoned any kind of privacy interest in the trash,” she explained. “And so the cops can search through that trash without a warrant. That reasoning has been extended to DNA — if you leave your DNA behind, then the cops could get it without a warrant and test it.”

“If you consider DNA to be a form of ID, and the Supreme Court has already upheld state laws that allow officers to stop someone and ask for their ID, then this is the logical next step,” she added.

codisndismapsept2009Everyone in the United States knows who gets stopped by police the most: young black and brown people. It’s therefore not hard to imagine whose DNA is going to disproportionately fill up this national database, says Lynch.

“If the cops are stopping more African Americans or Latinos and they have the ability to collect their DNA just at a stop, then it means that the DNA database is going to be even more heavily weighted with DNA from immigrant communities and different ethnic minorities,” Lynch told NextGov.

Concerned about your local police department obtaining a rapid DNA device, or sending your DNA to the FBI just because you were arrested at a protest, or for a bench warrant? Take up the matter at the local level. Tell your city government you don’t want your city or town participating in this dragnet DNA sweep.

via PrivacySOS

Anonymous Releases How-to Instructions on Fooling Facial Recognition

Anonymous Releases How-to Instructions on Fooling Facial Recognition

http://youtu.be/mxgOn8ikQuQ

New Tips and Tricks to Fool Surveillance Cameras now Known to be using advanced algorithm technology for automated Facial Recognition and profiling. With a few of the right LED lights, and a 9 volt battery on the brim of a hat, one can walk around with a veil of protection yet not stand out in public.

October 15, 2012 – DCMX Radio: Wikileaks and Anonymous Fall-out Continued, High Tech Web Spying, Low-Income Biometric Datamining, Drone Strike Double-Tap

October 15, 2012 – DCMX Radio: Wikileaks and Anonymous Fall-out Continued, High Tech Web Spying, Low-Income Biometric Datamining, Drone Strike Double-Tap

Wikileaks Statement, Anonymous Responds – A parting of ways..?

Fact of the Day – Bin Laden family makes millions on defense industry Boom!

Facebook Spying Methods, Secrecy

Apples new i06 includes new (ad?)tracking

Drone Strikes Super Tech Double-Tap

Biomentric Privacy invasion – now being forced in low-income programs


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Book Description
Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war.
Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47
A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95
Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33
They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–

Editorial Reviews
About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.

——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!

http://www.amazon.com/exec/obidos/ASIN/0979560861/ref=nosim/cryptogoncom-20

1 Billion Invested: FBI Launches Facial Recognition Project

1 Billion Invested: FBI Launches Facial Recognition Project

The Next Generation Identification programme will include a nationwide database of criminal faces and other biometrics

“FACE recognition is ‘now’,” declared Alessandro Acquisti of Carnegie Mellon University in Pittsburgh in a testimony before the US Senate in July.

It certainly seems that way. As part of an update to the national fingerprint database, the FBI has begun rolling out facial recognition to identify criminals.

It will form part of the bureau’s long-awaited, $1 billion Next Generation Identification (NGI) programme, which will also add biometrics such as iris scans, DNA analysis and voice identification to the toolkit. A handful of states began uploading their photos as part of a pilot programme this February and it is expected to be rolled out nationwide by 2014. In addition to scanning mugshots for a match, FBI officials have indicated that they are keen to track a suspect by picking out their face in a crowd.

Another application would be the reverse: images of a person of interest from security cameras or public photos uploaded onto the internet could be compared against a national repository of images held by the FBI. An algorithm would perform an automatic search and return a list of potential hits for an officer to sort through and use as possible leads for an investigation.

Ideally, such technological advancements will allow law enforcement to identify criminals more accurately and lead to quicker arrests. But privacy advocates are worried by the broad scope of the FBI’s plans. They are concerned that people with no criminal record who are caught on camera alongside a person of interest could end up in a federal database, or be subject to unwarranted surveillance.

The FBI’s Jerome Pender told the Senate in July that the searchable photo database used in the pilot studies only includes mugshots of known criminals. But it’s unclear from the NGI’s privacy statement whether that will remain the case once the entire system is up and running or if civilian photos might be added, says attorney Jennifer Lynch of the Electronic Frontier Foundation. The FBI was unable to answer New Scientist‘s questions before the magazine went to press.

The FBI hasn’t shared details of the algorithms it is using, but its technology could be very accurate if applied to photographs taken in controlled situations such as passport photos or police shots.

Tests in 2010 showed that the best algorithms can pick someone out in a pool of 1.6 million mugshots 92 per cent of the time. It’s possible to match a mugshot to a photo of a person who isn’t looking at the camera too. Algorithms such as one developed by Marios Savvides’s lab at Carnegie Mellon can analyse features of a front and side view set of mugshots, create a 3D model of the face, rotate it as much as 70 degrees to match the angle of the face in the photo, and then match the new 2D image with a fairly high degree of accuracy. The most difficult faces to match are those in low light. Merging photos from visible and infrared spectra can sharpen these images, but infrared cameras are still very expensive.

Of course, it is easier to match up posed images and the FBI has already partnered with issuers of state drivers’ licences for photo comparison. Jay Stanley of the American Civil Liberties Union urges caution: “Once you start plugging this into the FBI database, it becomes tantamount to a national photographic database.”

SOURCE: NewScientist

FinFisher Illegal Spyware Found On At Least Five Continents

FinFisher Illegal Spyware Found On At Least Five Continents

The FinFisher spyware made by U.K.- based Gamma Group likely has previously undisclosed global reach, with computers on at least five continents showing signs of being command centers that run the intrusion tool, according to cybersecurity experts.

FinFisher can secretly monitor computers — intercepting Skype calls, turning on Web cameras and recording every keystroke. It is marketed by Gamma for law enforcement and government use.

Bloomberg News reported July 25 that researchers believe they identified copies of FinFisher, following an examination of malware e-mailed to Bahraini activists. Their work, led by security researcher Morgan Marquis-Boire, was published the same day by the University of Toronto Munk School of Global Affairs’ Citizen Lab. Photographer: Jacob Kepler/Bloomberg

Research published last month based on e-mails obtained by Bloomberg News showed activists from the Persian Gulf kingdom of Bahrain were targeted by what looked like the software, sparking a hunt for further clues to the product’s deployment.

In new findings, a team, led by Claudio Guarnieri of Boston-based security risk-assessment company Rapid7, analyzed how the presumed FinFisher samples from Bahrain communicated with their command computer. They then compared those attributes with a global scan of computers on the Internet.

The survey has so far come up with what it reports as matches in Australia, the Czech Republic, Dubai, Ethiopia, Estonia, Indonesia, Latvia, Mongolia, Qatar and the U.S.

Guarnieri, a security researcher based in Amsterdam, said that the locations aren’t proof that the governments of any of these countries use Gamma’s FinFisher. It’s possible that Gamma clients use computers based in other nations to run their FinFisher systems, he said in an interview.

‘Active Fingerprinting’

“They are simply the results of an active fingerprinting of a unique behavior associated with what is believed to be the FinFisher infrastructure,” he wrote in his report, which Rapid7 is publishing today on its blog at https://community.rapid7.com/community/infosec/blog.

The emerging picture of the commercially available spyware’s reach shines a light on the growing, global marketplace for cyber weapons with potential consequences.

“Once any malware is used in the wild, it’s typically only a matter of time before it gets used for nefarious purposes,” Guarnieri wrote in his report. “It’s impossible to keep this kind of thing under control in the long term.”

In response to questions about Guarnieri’s findings, Gamma International GmbH managing director Martin J. Muench said a global scan by third parties would not reveal servers running the FinFisher product in question, which is called FinSpy.

“The core FinSpy servers are protected with firewalls,” he said in an Aug. 4 e-mail.

Gamma International

Muench, who is based in Munich, has said his company didn’t sell FinFisher spyware to Bahrain. He said he’s investigating whether the samples used against Bahraini activists were stolen demonstration copies or were sold via a third party.

Gamma International GmbH in Germany is part of U.K.-based Gamma Group. The group also markets FinFisher through Andover, England-based Gamma International UK Ltd. Muench leads the FinFisher product portfolio.

Muench says that Gamma complies with the export regulations of the U.K., U.S. and Germany.

It was unclear which, if any, government agencies in the countries Guarnieri identified are Gamma clients.

A U.S. Federal Bureau of Investigation spokeswoman in Washington declined to comment.

Officials in Ethiopia’s Communications Minister, Qatar’s foreign ministry and Mongolia’s president’s office didn’t immediately return phone calls seeking comment or respond to questions. Dubai’s deputy commander of police said he has no knowledge of such programs when reached on his mobile phone.

Australia’s department of foreign affairs and trade said in an e-mailed statement it does not use FinFisher software. A spokesman at the Czech Republic’s interior ministry said he has no information of Gamma being used there, nor any knowledge of its use at other state institutions.

Violating Human Rights?

At Indonesia’s Ministry of Communications, head of public relations Gatot S. Dewa Broto said that to his knowledge the government doesn’t use that program, or ones that do similar things, because it would violate privacy and human rights in that country. The ministry got an offer to purchase a similar program about six months ago but declined, he said, unable to recall the name of the company pitching it.

The Estonian Information Systems Authority RIA has not detected any exposure to FinSpy, a spokeswoman said. Neither has Latvia’s information technologies security incident response institution, according to a technical expert there.

Bloomberg News reported July 25 that researchers believe they identified copies of FinFisher, following an examination of malware e-mailed to Bahraini activists. Their work, led by security researcher Morgan Marquis-Boire, was published the same day by the University of Toronto Munk School of Global Affairs’ Citizen Lab.

‘Hallo Steffi’

The new study builds on those findings, using the same samples of malicious software.

Guarnieri’s study found, among other things, that the Bahrain server answered anyone connecting to it with the message, “Hallo Steffi.”

The investigators then found this pattern in other computers by searching data from an Internet survey research project, Critical.IO, which has been cataloging publicly accessible computers around the world.

The researchers then developed a map that shows the location of the servers, along with their unique IP addresses on the Internet.

Gamma’s Muench said none of its server components sends out strings such as “Hallo Steffi.”

The earlier Citizen Lab research linked the malware sent to the activists to FinSpy, part of the FinFisher spyware tool kit.

The Citizen Lab research showed the malware took screen shots, intercepted voice-over-Internet calls and transmitted a record of every keystroke to a computer in Manama, the capital of Bahrain, which has been gripped by tension since a government crackdown on protests last year.

Muench said the computer found in Manama isn’t a FinFisher product. Instead, the server very likely runs custom-built software used to forward traffic between two or more other systems, he said.

SOURCE: Bloomberg.com

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.

Previous generations never had to deal with “pre-crime” surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above. Previous generations would have never even dreamed that street lights and refrigerators might be spying on them. Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you. We are rapidly heading toward a world where there will be no such thing as privacy anymore. Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you. The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you….

#1 “Pre-Crime” Surveillance Cameras

A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously. In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.

#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI….

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.

#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American cops are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier….

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.

#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies “before they jump into the pool,” said John Appleby, a manager in the DHS Science and Technology Directorate’s division of borders and maritime security.

The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year….

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens. Just check out what is going on in India….

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students….

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don’t laugh.

Such technology is actually being actively developed. The following is from a recent NewScientist article….

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.

#11 Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining“, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com….

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.

Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don’t laugh.

That is exactly what CIA Director David Petraeus says is coming….

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously ‘dumb’ home appliances such as fridges, ovens and lighting systems.

For many more ways that Big Brother is spying on you, please see these articles….

Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You

30 Signs That The United States Of America Is Being Turned Into A Giant Prison

The things that I have written about above are just the things that they admit to.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below….

Source: The American Dream