It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

10 ways ‘the police state’ tracks you

page: 1
7

log in

join
share:

posted on May, 30 2011 @ 09:54 AM
link   
Here's a great article im to share , an article well informing the idea how the modern technology can hear your wispers !


The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry, which now seems to be becoming a war on “liberty and privacy.” Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot.

High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:

GPS — Global positioning chips are now appearing in everything from U.S. passports and cell phones to cars. More common uses include tracking employees, and for all forms of private investigation. Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.

Internet — Internet browsers are recording your every move forming detailed cookies on your activities. The National Security Administration has been exposed as having cookies on their site that don’t expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide no privacy to users while technologies advance for real-time social network monitoring is already being used. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple’s iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cybersurveillance by citizens.



Activist Post
edit on 30-5-2011 by solid007 because: (no reason given)

edit on 30-5-2011 by solid007 because: (no reason given)

edit on 30-5-2011 by solid007 because: (no reason given)


 
Mod Note: External Source Tags – Please Review This Link.
Quoting External Sources - Please Review This Link
Mod Note: Starting A New Thread ?... Look Here First.

edit on Mon May 30 2011 by Jbird because: added ex tags trimmed quote




posted on May, 30 2011 @ 10:15 AM
link   
Familiar with most described tech...

However.. GPS enable passports ??? u got a link to that cause it seems unreal.



posted on May, 30 2011 @ 10:19 AM
link   
This was all foretold 2,000 years ago.

REVELATION 13:17 - "And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name."

Not bad for a cave man huh?



posted on May, 30 2011 @ 10:25 AM
link   
Don't forget cel phones. Even if you have a prepay like I do, they can still find out who you are by your call history. If the government ever knew any of your past numbers more than likely your new unregistered number follows the same pattern of calls.



posted on May, 30 2011 @ 10:27 AM
link   
reply to post by solid007
 


Here's a few links that you all may find interesting as well. The first two are from an article in wired on different military tracking methods that have been released or are at their end stages of development. The third is a news story about the attempt to implement biometric ids in India (from back in Sept. 2010).

www.wired.com...
www.wired.com...
www.thenewamerican.com...



posted on May, 30 2011 @ 04:35 PM
link   
reply to post by solid007
 


Thanks for sharing your article. It's really sad how our freedom has been intruded upon and taken away from us. Am sure your article will ''awaken'' a lot of others, so again thank you!

We all need to take a stand. Ya know , I use to not even think about stuff such as this, Well, my eyes are opened now, and I do NOT like what I see.


There is so much in this world that is bass ackwards : This upsets and makes me angry!


edit on 30-5-2011 by SeekerLou because: correction

edit on 30-5-2011 by SeekerLou because: (no reason given)



posted on May, 30 2011 @ 04:40 PM
link   
reply to post by OldCorp
 



Gotta Love ya OldCorp!
Yep, HE said it and I believe it too.

These imo are certainly the stepping stones-to fulfill His prophecy.
It will even get worse!

This imo is truly related to the times prophesied in the Holy Bible.



posted on May, 30 2011 @ 05:05 PM
link   
reply to post by OldCorp
 


a cave man describing rome and the tatoo needed for paying taxes.

yawn



posted on Jun, 1 2011 @ 03:00 PM
link   
reply to post by solid007
 


To add: Here is an additional way of tracking that they are secretly testing in an undisclosed location. If you haven't already seen the link here at ATS : re: Precrime thoughts. It can be found here www.abovetopsecret.com...
Tracking of thoughts before the crime ..which is some scary stuff.

Also those chain savings cards , such as Krogers, CVS, etc.
They know your eating habits, meds, etc. ALLLll about you. /us.

edit on 1-6-2011 by SeekerLou because: (no reason given)



posted on Jun, 2 2011 @ 12:45 AM
link   
i posted on facebook something i learned about the catholic church..next thing i knew my posts didappeared..when i talked to a friend about it on chat my chat was flagged and shut down for 24 hours..tell me they arnt watching!!



posted on Jun, 2 2011 @ 01:00 AM
link   
Reply to post by SeekerLou
 


Yup. So true. I use to work at Rite Aid and I saw with my own two eyes a compiled list of EVERYTHING a certain customer has purchased using her Wellness card. They do keep track of it. And when you sign up with these savings cards, they ask for an address and phone number. I know it is not really needed at Rite Aid, you can get the card without disclosing that information, but it amazes me how many people do not think twice to fill it out. That's with a lot of stuff. Like signing up for a contest on some website.


 
Posted Via ATS Mobile: m.abovetopsecret.com
 



posted on Jun, 2 2011 @ 09:59 AM
link   
reply to post by Shawny2222
 


Agreed, no one thinks twice. Is it WORTH the savings vs their having a log on you?

If it weren't for truth and knowledge at the other end of this keyboard... I'd give up the internet, but then I would NEVER know what's really going on in the world!

I despise that they track and profile us like they do. No more freedom. This world is just not what it use to be. I want to cry for my Nanny to hold me... I don't like THIS nanny state.



posted on Jun, 2 2011 @ 05:24 PM
link   
Hey this is my first post. I was gonna start a thread about this but I can't til 20 replies. The only way to subvert police surveillance is by using military grade encryption. That means one time pads.

Here's an article I wrote and crossposted to reddit. I haven't seen enough of this being talked about on the net. And if any of you would like to make a new thread to discuss this please c/p and do so as I'm a new member.


www.reddit.com...


One Time Pad Generation, Relays, Rootkits and Chip Security

This may be out of the bounds of most reader's needs, but if you're prepared in other ways perhaps its time to consider upgrading your security / communications. It's shocking how poorly documented high level cryptography can be. If you're trying to get a massive RSA key past 4096 bits, look out, because most RSA software won't generate a key past around 64000 bits, let alone the megabytes you need to ensure security these days with that cipher.

1024 RSA has been broken by a few hundred computers in on the order of hours. 4096 RSA we can presume to be currently open to the government. What's worse, because RSA is vulnerable to quantum factoring, unlike other algorithms it will be completely destroyed should someone break the quantum computing puzzle (and you can bet the govt will be first.)

Instead of searching for another symmetric key algorithm that factors in square polynomial time to future quantum computers, go straight for the very best, random One Time Pads. Around WW2 (although the development of these thoughts certainly preceded this,) the Allies switched from using numbers generated from lottery balls to quantum random number generators based on Michaelson-Morrelly interferometers. Because of the many weaknesses in Axis selection of random numbers, and errors in re-transmissions or re-use of codes; OTP successes / failures lead to enormous tactical advantages in the war.

Classical random number generators are NOT sufficient. Most hardware RNG's you can buy on the internet today will claim to be completely quantum in nature. This is a lie. Independent tests of cheap hardware RNG's confirm their classical, vulnerable nature. You will need to spend between $500-$2000 to get a proper MegaByte per sec RNG based on quantum interference or other quantum noise effects. Do not buy cheap $100 RNG's. They will not work properly. Also, if you are so technically inclined it is much more affordable to build and calibrate your own interferometer. Very simple for those who are familiar with the equipment.

Additonal software is necessary to distill and hash the raw RNG data. Linux [I use Debian but most security nuts rave about OpenBSD] provides all this free and there is probably Windows software which also fulfills this purpose but running Windows almost defeats any security advantage OTP tech has to offer.

If this was all there was to it, security would be a hassle, but doable. Unfortunately your chip is not secure. Intel recently admitted they are remote rootkitting all chips for supposed "DRM" purposes. (Digital rights management, anti-piracy.) These rootkits are hardware based, and cannot be defeated thru software alone. In fact, there is very legitimate speculation on many security forums that these / or variants of these types of rootkits have existed since the 80's or 90's in Intel / AMD---although I won't go into that now. What's important is that Sun Microsystems has an openly published chipset called OpenSPARC. IMO this is the current safest bet in terms of avoiding rootkits. It's still possible that OpenSPARC has a security flaw, but the opensource community can catch it. Certainly better than Intel; who admit they just straight up rootkit it from the start now.

You'd be shocked how easy it is to create a rootkit. I've read posts on security forums that indicate how hiding these devices in plain sight doesn't necessarily alert anyone. For instance, one weakness in a (nonSPARC) chip was based on the fact that two circuits were manufactured in such a way as to have an effect on eachother that wasn't documented in the hardware's guide. This effect was enough for a bleedthru signal which leaks info about unciphered I/O processes. By creating a bridge from secure memory space to insecure memory space you gut the system like a fish to any unauth'd user.

Of course all hardware vendors are aware of these problems. But they don't care. Not enough to prevent them anyways. The bottom line $$$ is always most important and security is a distant threat that barely affects their designs (except to conform to a minimal standard.) Which means there's no reason to expect that OpenSPARC hasn't accidently compromised their hardware thru legacy chip design or simple oversight. (VERY hard to rule out a rootkit in millionpage+ designs). This doesn't even count the possibility of government colluding with chip manufacturers to root every available consumer chip.

Also there's a new boogey man I never knew existed before I started browsing for this info. Let's say you're a hostile govt agency bent on Total Information Awareness (that used to be a program name). If you truly had total hidden root access on a computer, it would be trivially easy to monitor for random signals. I.E. to scan covertly for ANY sign of random data. Then; when the chip is I/O processing the XOR of one time pad + data; your rootkit introduces a slight error. You could make it look just as random - but with hidden flaws introduced. (This part is mathematically above me but I know such schemes are possible based on others writings.) Then all one time pad comm is compromised on the system.

There are ways of defeating even this type of abominable rootkit; but it basically involves auditing and barebone scraping HD drivers, assembling a custom XOR OTP circuit from a barebone integrated circuit, and using a physical firewall to transfer data onto a network.. absurd really. And beyond the capabilites of almost anyone. Which is why our govts spying program works so well!


Also. What do you DO once you've generated OTP info? Well there are countless free programs out there that will cipher/decrypt your plaintext messages. Combine with email and you're set. However, if you're a bit more technically sophisticated there are several attempts to implement OTP over SSH. Here www.maurits.vdschee.nl... is one such attempt. [Script at bottom of page] I warn you to heed the authors warning though, that software is unfinished and not entirely secure; but it beats the alternative of using RSA to crypt your SSH.

Also, don't think that just because you're routing info thru SSH / VPN's / other countries that you're safe. Every connection you make is logged in such a way that reconstructing the path of your packets is trivially easy (for our government.) In times like these where privacy rights are nonexistent, massive warrantless domestic spy programs are running rampant, and countless beaurocratic individuals are being allowed access in an unregulated, unmonitored fashion to other's private information a little precaution is warranted. (Look at all the abuse going on with the FBI's PATRIOT shenanigans - monitoring ex girlfriend's phone lines, etc.; tens of thousands of requests for info all being rubberstamped, and imagine how much worse it could get soon.)

If you were so inclined to really escape your signal being tracked, the easiest options are HAM OTP relays [i.e. two or more computers in different parts of world connected by IP packet over radio with OTP ciphers, with the end relay node broadcasting to the net **NOTE this is illegal without an FCC license] Or cell phone / short dist radio relays. [i.e. drop a cell phone in the woods with a solar charger and patch into it from miles away via tightbeam.] Any voice capable cell phone can be turned into a dataline. Even the cheap TracFone's can be hacked to turn into a 2.5 KBps data line where lowest service level is available. (Google for more info on specific phone models.) Or a link to an open wifi could be established. (This is illegal in some states without permission.)

On top of that layer; or alternatively without an end relay for those who can't afford - you should be purchasing access (or at least getting several free proxy servers from the endless lists online) to servers in multiple countries and routing your exit thru them with VPN / SSH software.

We can't all be James Bond accessing our email. But OTP / secure chips / secure relays can provide a level of security unparalleled by current popular alternatives.

-written by Marat ----in honor of "The People's Hero" Jean Paul Marat www.amazon.com...



posted on Jun, 2 2011 @ 06:01 PM
link   
I recently went to the library and read an ebook called "The Shadow Government" by Grant R. Jeffery

I took some notes while reading this book...now I am sharing them with all of you.

- The (RFID) chip implanted in billions of products
- (EPC) electronic product code
- Post office will eventually embed every postage stamp with (RFID chip)
- Smart card - will replace cash as well as credit and debit cards
- Chips will be added to cash
- Chips added to passports
- (Java I-button) computer chip worn as jewelry
- Fingerprint scanners


- (Project Echelon) - records every phone call, fax, email and internet surfing
(Echelon) is managed by (5) Western Nations:
United Stated
United Kingdom
Canada
Australia
New Zealand (in 1948 secret agreement called UKUSA)

- There is what is called (A Voice of God) weapon (audio and video)

- (Weather Warfare) HAARP

- Each nation maintains subterranean military bases and virtual cities

- The (COG - Continuity of Government) and (FEMA - federal emergency management agency) have a 200,000 square foot facility located in a 434 acre mountain site that borders Loudon and Clarke counties of Virginia.

- The Bilderberger Group initially financed by Cia and globalist council on foreign relations and the trilateral commission have consolidated control of the military and economy plus the political agenda of (America, Canada, Europe and Asia)

With the technology we are being watched with now....we ain't seen nothing yet!



new topics

top topics



 
7

log in

join