larger smaller reset

10 Cara Kita Dilacak, Ditelusuri, dan Didatabase

(10 Ways We Are Being Tracked, Traced, and Databased)

Apakah kemajuan teknologi melanggar hak kita untuk melakukan privasi?

 

passportThe war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry – which now seems to be becoming a war on “liberty and privacy.”  Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot.  High-tech, first-world countries  are being tracked, traced, and databased, literally around every corner.  Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security.  Here are just some of the ways the matrix of data is being collected:

GPS — Global positioning chips are now appearing in everything from U.S. passports, cell phones, to cars.  More common uses include tracking employees, and for all forms of private investigation.  Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.

Obama-internetInternetInternet browsers are recording your every move forming detailed cookies on your activities.  The NSA has been exposed as having cookies on their site that don’t expire until 2035.  Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses.  IP addresses are collected and even made public.  Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide NO privacy to users, while technologies for real-time social network monitoring are already being used.  The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information.  Apple’s iPhone also has browsing data recorded and stored.  All of this despite the overwhelming opposition to cybersurveillance by citizens.

rfid_hitachiRFID — Forget your credit cards which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your SSN.  Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more.  RFID  “proximity cards” take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access.  Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless — perhaps including tracking hard currency so we can’t even keep cash undetected. (Also see microchips below).

  • atm-fingerprintPublic sound surveillance — This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous “keywords.” This technology has been launched in Europe to “monitor conversations” to detect “verbal aggression” in public places.  Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.

Biometrics — The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and Government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in National identification cards.

  • Microchips — Microsoft’s HealthVault and VeriMed partnership is to create RFID implantable microchips.  Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future.  The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.
  • face-recognitionFacial recognition Anonymity in public is over.  Admittedly used at Obama’s campaign events, sporting events, and most recently at the G8/G20 protests in Canada. This technology is also harvesting data from Facebook images and surely will be tied into the street “traffic” cameras

All of this is leading to Predictive Behavior Technology — It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling.  It’s been marketed for such uses as blocking hackers.  Things seem to have advanced to a point where a truly scientific Orwellian world is at hand.  It is estimated that computers know to a 93% accuracy where you will be, before you make your first move.   Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.

Many of us are asking:  What would someone do with all of this information to keep us tracked, traced, and databased?  It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.

Sumber: http://www.pakalertpress.com/

Share/Save/Bookmark
Dibaca :3860 kali  

Komentar-Komentar  

cheap designer clothes
Quote
 
0
This is a really quality post.I find this information through Google
designer clothes online (www.withthesale.com/)
jordan 11 concord
Quote
 
0
This is such a beautiful image! Is that what you call Digital Painting? It looks stunning.,http: //www.airjordan 11concord.fr
Louis Vuitton Stores
Quote
 
0
your artical looks like food taste so delicious, much information is very useful to me. thanks,http://w ww.louisvuitton s2012.com
Louis Vuitton Diaper Bags
Quote
 
0
Super cute! My little man would look so stylin' in those!,http://w ww.diaperbagslo uisvuitton.com
syalala
Quote
 
0
gak usah sok narcissist di inet, kita udah gampang dikenal kok..
tapi kalau masih stay in the line, kayanya bakal baik2 aja.

hati2, kalau sedikit nyeleneh dari maunya para pengendali, bakal gampang nyebarin ID dab foto dengan tambahan WANTED DEAD OR ALIVE


Kode keamanan
Segarkan