The 18 things you may not realise Facebook knows about you: Firm reveals the extent of its spying in a 454-page document to Congress
- Facebook knows your exact mouse movements and battery status
- It can tell if your browser window is ‘foregrounded or backgrounded’
- In some cases, it monitors devices around its users or on the same network
- The details were revealed in document of answers to Congress following Mark Zuckerberg’s appearance in April over the Cambridge Analytica scandal
WHAT ARE THE 18 METHODS USED BY FACEBOOK TO TRACK USERS REVEALED IN LETTERS TO CONGRESS?
1. ‘Device information’ from ‘computers, phones, connected TVs, and other web-connected devices,’ as well as your ‘internet service provider or mobile operator’
2. ‘Mouse movements’, which can help distinguish humans from bots
3. ‘App and file names’, including the types of files on your devices
4. ‘Device operations’ such as whether a window running Facebook is ‘foregrounded or backgrounded’
5. ‘Device signals’, including ‘nearby Wi-Fi access points, beacons, and cell towers’ and ‘signal strength’ as well as Bluetooth signals
6. ‘Other devices that are nearby or on their network’
7. ‘Battery level’
8. ‘Available storage space’
9. ‘Plugins’ installed
10. ‘Connection speed’
11. ‘Purchases’ Facebook users make on third-party websites
12. Contact information ‘such as an address book’ and ‘call log or SMS log history’ for Android users with these settings synced
13. Information ‘about how users use features like our camera’
14. The ‘location of a photo or the date a file was created’ through the file’s metadata
15. ‘GPS location, camera, or photo’ information found through your device’s settings
16. Purchases from third-party data providers as well as other information about your ‘online and offline actions’
17. ‘Device IDs, and other identifiers, such as from games, apps or accounts users use’
18. ‘When others share or comment on a photo of them, send a message to them, or upload, sync or import their contact information’ text
The creepy ways Facebook spies on its users have been detailed in a bumper document presented to Congress.
They include tracking mouse movements, logging battery levels and monitoring devices close to a user that are on the same network.
The 454-page report was created in response to questions Mark Zuckerberg was asked during his appearance before Congress in April.
Lawmakers gave Zuckerberg a public grilling over the Cambridge Analytica scandal, but he failed to answer many of their queries.
The new report is Facebook’s attempt to address their questions, although it sheds little new light on the Cambridge Analytica scandal.
However, it does contain multiple disclosures about the way Facebook collects data.
Some are unsurprising, such as the time people spend on Facebook, while others may come as a shock to the majority of users.
Facebook tracks what device you are using to access the network.
To do this, it will log the hardware manufacturer of your smartphone, connected television, tablet, computer, or other internet-connected devices.
Facebook also tracks the operating system, software versions and web browser.
If you’re using a smartphone, it will keep a record of the mobile carrier, while internet service providers (ISPs) will be stored for users using a Wi-Fi or Ethernet connection to access Facebook.
In some cases, it will monitor devices that are using the same network as you.
‘Facebook’s services inherently operate on a cross-device basis: understanding when people use our services across multiple devices helps us provide the same personalized experience wherever people use Facebook,’ the firm wrote in the lengthy document.
According to Facebook, this is done, for example, ‘to ensure that a person’s News Feed or profile contains the same content whether they access our services on their mobile phone or in a desktop computer’s web browser.’
Facebook also says this information is used to curate more personalized ads.
Constitutional Judge Begs America to “Wake Up” Over Fed’s Plan to Spy on Your Web Activity
TOPICS:Andrew NapolitanoCivil LibertiesFBISurveillance
June 9, 2016
fbi-spyingBy Matt Agorist
This week, the US senate published a bill that would give the FBI seemingly unlimited power to pry into the “electronic communications” of American citizens. The bill would give the FBI warrantless access to email records as well as a slew of other electronic data.
Its passage could effectively end online privacy.
According to a report in the Intercept:
The provision, tucked into the Senate Intelligence Authorization Act, would explicitly authorize the FBI to obtain “electronic communication transactional records” for individuals or entities — though it doesn’t define what that means. The bill was passed by the Senate Intelligence Committee last week.
In the past, the FBI has considered “electronic communication transactional records” to be a broad category of information — including everything from browsing history, email header information, records of online purchases, IP addresses of contacts, and more.
The single ‘no’ vote against the bill came from Sen. Ron Wyden, who wrote a letter warning Americans that the bill’s provisions “would allow any FBI field office to demand email records without a court order, a major expansion of federal surveillance powers.”
Using the fear mongering tactics of “we need this to keep you safe,” the Fed will likely force this bill to become law.
The bill, if passed, could theoretically allow the FBI to target any individual who visits the FreeThoughtProject.com because of the subversive, yet entirely peaceful nature of the site. That information would then be stored, and a file kept on all people who are perceived rebellious by the State.
If you think the government declaring peaceful liberty-minded individuals as enemies of the state is far-fetched, think again. In 2009, a secret report distributed by the Missouri Information Analysis Center (MIAC) entitled “The Modern Militia Movement” specifically describes supporters of presidential candidates Ron Paul, Chuck Baldwin, and Bob Barr as “militia” influenced terrorists and instructs the Missouri police to be on the lookout for supporters displaying bumper stickers and other paraphernalia associated with the Constitutional, Campaign for Liberty, and Libertarian parties.
Of course, all laws like this one are ostensibly designed to keep you safe from ‘terror;’ however, as we’ve seen in the past — terrorism is but a fraction of the cause for legislation like this.
Taking to the airwaves to voice his concern over the death of the 4th Amendment in relation to Senate Intelligence Authorization Act, Judge Andrew Napolitano unleashed his fury.
Napolitano noted the sheer ominous nature of a bill that would allow the FBI access to a person’s Web history.
He pointed out that the government will, as it always does, argue that this is necessary to keep us safe from terror attacks. But he would note that the argument is a “facade.”
“This law will pass because the Congress doesn’t give a damn about whether it’s unconstitutional!” said Napolitano.
Pointing out that the police state continues to get worse, regardless of which puppet is in the White House, Napolitano bravely said, on FOX News of all places, “It always gets worse, it never gets better. No matter who’s in the White House, and no matter which party controls the Congress.”
“The American people should wake up. This is a major step…….toward a police state,” he said.
At the end of the video, Shepard Smith makes a hard hitting point about why this is able to continue.
People get riled up about the stupidest things and something important like this, you can’t get them to even send an email.
Do you distrust the banking system? Prefer to do business in cash? Complain about the encroachment of Big Brother into every facet of your life?
If you answered “yes” to any of these questions, you’d better watch out. You’re a “person of interest” – and a growing number of businesses must report your “suspicious activities” to the feds. If they don’t, they can be fined and the responsible parties even imprisoned.
These requirements originated in a law called the “Bank Secrecy Act” (BSA). Of course, this Orwellian law has nothing at all to do with protecting bank secrecy. Indeed, the BSA has all but eliminated confidentiality.
Regulations issued under the BSA require financial institutions to notify the Financial Crimes Enforcement Network (FinCEN), a Treasury Department bureau, of any unusual transactions in which their customers engage. Reporting is mandatory for transactions that exceed $10,000 and are not the sort in which the particular customer would normally be expected to engage. For money transmitter businesses, a $2,000 threshold applies.
The businesses covered by these requirements must file “suspicious activities reports” (SARs) secretly, without your knowledge or consent. FinCEN makes the reports available electronically to every US Attorney’s office and to dozens of law enforcement agencies. No court order, warrant, subpoena, or even written request is needed to access a report.
What exactly is suspicious? According to official Treasury guidance, suspicious behavior includes:
- Paying off a loan;
- Objecting to completing Currency Transaction Reports (required for transactions over $10,000);
- Changing currency from small to large denominations;
- Buying cashier’s checks, money orders, or travelers’ checks for less than the reporting limit ($10,000 for a cash transaction);
- Making deposits in cash, then having the money wired somewhere else; and
- Withdrawing cash without counting the cash first.
Now, FinCEN has issued preliminary regulations that could extend these rules to investment managers. All SEC-registered investment advisers would be required to design and implement an anti-money-laundering program. They would also need to file SARs with FinCEN.
Once these rules come into effect, investment advisors would no longer be accountable to you, their client. Their highest duty, reinforced by civil and criminal sanctions, would be to act as unpaid undercover agents for the US Treasury.
But FinCEN’s suspicious transaction reporting rules are just the tip of the iceberg. For instance, official guidance from the FBI and other government agencies indicate that all of the following actions make you a terror suspect:
- Making an inter-library loan request for “The Little Red Book” by former Chinese communist leader Mao Tse-Tung;
- Owning a suspicious cat;
- Wearing a politically provocative shirt;
- Searching online for a pressure cooker and backpack;
- Putting a “Do not disturb” sign on the door to your hotel room;
- Making politically inflammatory remarks when getting a tattoo;
- Attempting to shield your computer screen from the viewing of others;
- Expressing frustration with “mainstream ideologies”; and
- Storing more than seven days of food in your home.
Then there’s the “drug courier profile” developed by the Drug Enforcement Administration (DEA). The following profiles are all court-approved reasons to search you and your property:
- Having a pale or dark complexion;
- Having a Hispanic appearance;
- Being between the ages of 25 and 35;
- Acting too nervous or too calm;
- Carrying $100, $50, $20, $10, or $5 bills;
- Wearing casual clothing;
- Wearing perfume;
- Having window coverings on your personal residence;
- Buying a one-way or round-trip airline ticket; and
- Being among the first, last, or middle group of passengers off of an airplane.
As Richard Miller expressed in his landmark book, Drug Warriors and Their Prey,
[B]eing a citizen is sufficient cause to suspect a person of criminal conduct, thereby constricting civil liberties protections for that person. That situation is hard to distinguish from the legal status of citizens of Nazi Germany.
In a world that views virtually everything you do as suspicious, there aren’t a lot of options to protect yourself. Indeed, simply by expressing your interest in privacy, asset protection, precious metals, or any of the other topics I cover routinely, you’re likely on one government watch list or another already.
However, you can take steps to avoid having a bank or other financial institution – including an investment manager – file an SAR on you. If you’re considering doing anything out of the ordinary in your account, talk to an officer at the bank, brokerage, or other financial institution first. For instance, you might want to let someone know before you pay off a loan or make or receive a large transfer.
If you have a reasonable explanation for the transaction, it’s much less likely to set off an alarm. And in a country in which all citizens are considered criminal suspects, that’s definitely something you want to avoid.
Image Credit: Anthony Freda Art
You can read more from Mark Nestmann at Nestmann.com
It turns out the NSA was collecting voice calls, photos, passwords, documents, and much more
Cale Guthrie Weissman
Jul. 1, 2015
NSA documents leaked to the Guardian in 2013 described a covert program called XKeyscore, which involved a searchable database for intelligence analysts to scan intercepted data.
Now, new documents show the breadth of this program and just what sort of data XKeyscore catalogs.
According to a new report from The Intercept, the amount of data XKeyscore scoops up as well as the sort of data it collects is much larger than originally thought.
Here are a few highlights from the new report:
The XKeyescore database is “fed a constant flow of Internet traffic from fiber optic cables that make up the back of the world’s communication network, among other sources, for processing,” the new report writes. Its servers collect all of this data for up to five days, and store the metadata of this traffic for up to 45 days.
Web traffic wasn’t XKeyscore’s only target. In fact, according to the documents posted by The Intercept, it was able to gather data like voice recordings. A list of the intercepted data included “pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.”
How the search works is very advanced. The new documents detail ways that analysts can query the database for information on people based on location, nationality, and previous web traffic.
XKeyscore was also used to help hack into computer networks for both the US and its spying allies. One document dated in 2009 claims that the program could be used to gain access into unencrypted networks.
Using XKeyscore was reportedly insanely easy. “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds,” security researcher Jonathan Brossard told The Intercept. “Simple. As easy as typing a few words in Google.”
While XKeyscore has been known as an intelligence tool for years now, these new documents highlight just how advanced and far-reaching the program’s surveillance is.
The NSA, in a statement to The Intercept, claims that all of its intelligence operations are “authorized by law.” It added, “NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”
Read more: http://www.businessinsider.com/nsa-xkeyscore-surveillance-program-details-revealed-in-new-snowden-documents-2015-7#ixzz3eqx12a82
Has everybody gone stupid? The NSA has not stopped spying on Americans… and it never will, either
(NaturalNews) There are days I just shake my head in bewilderment at the astonishing, almost incomprehensible gullibility of mainstream Americans and the media that claims to be practicing intelligent journalism. When I see the Associated Press report things like, “The NSA had stopped gathering the records from phone companies hours before the deadline,” I’m almost paralyzed with disbelief.
That’s their story, though. And they apparently believe it. See Either way, no more NSA collection of US phone records. Read the story yourself if you need a really good laugh at an example of extreme gullibility in the media.
What’s so funny about that story? For starters, given that the NSA is a super secret organization with ZERO oversight and a history of repeatedly lying about what it’s really doing, how on Earth are we supposed to believe the NSA when it says it suddenly stopped spying on Americans’ phone calls because it “lost the authority” it never recognized in the first place?
Is the mainstream media really just taking the NSA’s word that it has stopped spying on everybody because it no longer has the “legal authority” to do so? There isn’t a single shred of evidence that the NSA has stopped any spying activities at all. Even more, the Associated Press has no way to verify whether anything has been halted. Trusting the NSA’s statement claiming it has halted its spying activities is about as gullible as trusting Iran’s statements on how it has halted its nuclear fuel enrichment program. Geesh… how hard is it for people to understand that governments lie by default?
Grow up, America. The NSA was spying on us all long before it ever had any legal authority to do so, and when the Director of National Intelligence James Clapper was asked under oath, at a United States Senate Select Committee on Intelligence, about whether the NSA was spying on Americans, he outright lied over and over again, claiming no such spying was taking place.
So now, suddenly, we’re supposed to believe the NSA isn’t spying on us all merely because it says so? Should we pull out our pinkies and do a pinky swear on it, too? Maybe we can be BFF as well?
The NSA recognizes no legal authority, period
It’s just incredible that anyone would think the NSA’s activities are bound by anything even resembling “legal authority.” The NSA does whatever the hell it wants. And why does it do that? Because it can. Because they’ve already gathered up all the records of U.S. Supreme Court judges and they have enough emails, phone calls, web surfing history and search engine history to blackmail practically everyone in Washington D.C. (and everywhere else, for that matter).
“However Congress resolves its impasse over government surveillance, this much is clear: The National Security Agency will ultimately be out of the business of collecting and storing Americans’ calling records,” says the Associated Press. Yeah, right. In your crack-induced fairytale, maybe. But in the real world of hardball politics and blackmail, any organization that has the power to keep collecting all these records will absolutely keep doing so unless and until it is physically forced to stop (i.e. shut off the power, confiscate the servers and close the buildings).
And that’s never gonna happen, folks. Not by a long shot. The spy apparatus is far too valuable to ever be shut down. At best, it will pretend to shut down long enough to shut up the public. But behind the scenes, every single spy server dedicated to this task will continue as normal, without interruption.
Sorry to have to say this so bluntly, but anyone who believes the government is going to voluntarily stop spying on the American people is a complete fool. The way these games are really played is far beyond any recognition of “legal authority.” For example, the NSA can simply take its entire spy operation, transfer the assets to an NSA shell company in the Cayman Islands (without actually moving the servers anywhere), rename it “NSB” and continue operations as normal… all while testifying before Congress that, “The NSA has halted all domestic surveillance operations.” Yep, it has! But NSB has resumed those operations, ha ha.
And if NSB is ever unveiled, they can move it all to “NSC” and so on. The spying never stops, folks. The only thing that changes is the name of the spy organizations conducting it. Does any intelligent person honestly think they’re going to voluntarily shut off all those billions of dollars in servers and storage facilities they built for this purpose? Ain’t gonna happen.
And the way you know this to be true is to ask yourself this question: If you were the director of the world’s most amazing intelligence gathering spy tool that operated utterly without any boundaries or limitations whatsoever, would YOU shut it down? Of course not. No one would. You’d use it precisely because it’s powerful. It’s the Ring of Power from the Lord of the Rings. Almost no human being has the moral integrity to voluntarily part with it. It’s so PRECIOUSSSSS…
True American heroes: Edward Snowden and Rand Paul
Despite the ongoing spy activities of the NSA, it’s worth mentioning something hugely important in all this.
There is only ONE Presidential candidate who has the courage to stand up against the surveillance state and demand an end to these illegal violations of Americans’ privacy. His name is Rand Paul.
As far as I can tell, Rand Paul is the only candidate who has a spine. While Jeb Bush and Hillary Clinton are both total spy state insiders, Rand Paul is risking not just his political career but even his own neck to take a stand against the surveillance state. That’s historic. It’s truly remarkable, and it may uniquely qualify Rand Paul to be the kind of serious reformer who can take on Washington and knock some heads around.
Edward Snowden is also, of course, the key hero in all this, and I strongly recommend you watch the documentary called Citizen Four to gain a better understanding of Snowden’s contributions to privacy and freedom in America. Edward Snowden has quite literally risked his life — and forfeited his own personal freedom — to blow the whistle on the illegal spying being conducted by the U.S. government on the citizens of America.
What should have happened immediately after Snowden’s shocking revelations was a nationwide movement of pissed off people marching in the streets against Orwellian government. But what really happened instead was a nationwide movement of apathetic sheeple turning on Oprah and munching down some Twinkies before injecting themselves with insulin. In other words, nobody gave a damn because they were too busy cowering in blind obedience and practicing cowardice and conformity.
And so they all are getting the government they deserve: an Orwellian spy state that enslaves them all. This is what they are begging for, after all, when they are so gullible that they’ll believe anything the government tells them. The same people who believe the NSA magically stopped spying on them must also believe the FDA protects the people, the DEA wants to eliminate the drug trade, and the CDC is trying to eradicate infectious disease.
Wake up and smell reality, folks. None of these entities give a damn about the People. They all exist for only one purpose: to expand and assert their own power by any means necessary. That’s the fundamental nature of organizational existence, and it’s precisely why Big Government keeps getting bigger, badder and more dangerous unless its power is somehow limited or halted by the People.
Hence the origins of the Bill of Rights in the first place, over two centuries ago.
We’ve been down this road before, of course. This isn’t the first rise of police state tyranny in the history of our world. And it certainly won’t be the last…
NY Cops Used ‘Stingray’ Spy Tool 46 Times Without Warrant
The police department in Erie County, New York fought hard to prevent the New York Civil Liberties Union from obtaining records about its use of a controversial surveillance tool known as a stingray.
The reason why may be because of what the records show: that cops in that county, which includes the city of Buffalo, used the devices 47 times since 2010 but only once sought and obtained a court order to do so. That revelation contradicts what the county sheriff said last year when he asserted that the department only used the devices under “judicial review.”
In the single case in which police sought permission from a court, they asked for a court order rather than a warrant, which carries a higher burden of proof. And in their request, they mischaracterized the true nature of the tool.
“These records confirm some of the very worst fears about local law enforcement’s use of this expensive and intrusive surveillance equipment.”
The records, which the NYCLU published in a blog post today, also show that the county sheriff’s office signed a stringent gag order with the FBI to maintain secrecy about their stingray records. The department was told to withhold information about the devices in any documents filed with courts, such as affidavits and other documents describing how they obtained evidence in criminal cases. The department was even told that the FBI maintained the right to intervene in county prosecutions to request criminal cases be dismissed if there was a chance that a case might result in the disclosure of information about law enforcement’s use of stingrays.
“Stingrays are an advanced surveillance technology that can sweep up very private information, including information on innocent people,” NYCLU Western Region Director John Curr III said in a statement. “If the FBI can command the Sheriff’s Office to dismiss criminal cases to protect its secret stingrays, it is not clear how the $350,000 we are spending on stingray equipment is keeping the people of Buffalo safer.”
The revelations continue a trend in several states across the U.S. wherein law enforcement agencies have gone to great lengths to prevent the public from learning about their use of stingrays. The surveillance tool simulates a legitimate cell phone tower to trick mobile phones and other devices on a cellular network into connecting to the devices and revealing their location. Stingrays emit a signal that is stronger than the signal of other cell towers in the vicinity in order to force mobile phones and other devices to establish a connection with them and reveal their unique ID. Stingrays can then determine the direction from which the phone connected— a data point that can then be used to track the movement of the phone as it continuously connects to the fake tower.
Many police departments have signed non-disclosure agreements with the Harris Corporation, one of the leading makers of the devices, to prevent them from releasing records about the systems or discussing them. In Florida, the U.S. Marshals service went so far as to seize records about a local police department’s use of stingrays in order to prevent the American Civil Liberties Union from obtaining them. And many law enforcement agencies have deceived judges about their use of the devices in order to prevent defendants and the public from learning about how they’re being used.
Erie County similarly fought hard to prevent the NYCLU from obtaining these records but was ordered to turn them over by a court. The documents show that the sheriff’s office used stingrays at least 47 times between May 1, 2010 and October 3, 2014. The one time the department sought judicial approval was in October 2014, contrary to what Erie County Sheriff Tim Howard said in May, 2014: that the devices were used under “judicial review” in all criminal matters, implying that investigators always seek court approval before using them.
Not only this, but the records show that when the department did seek a court order, they identified the spy tool they planned to use as a pen register device, not a stingray or cell site simulator. The use of the term “pen register device” is controversial. Law enforcement agencies maintain that stingrays operate like pen registers and are not invasive, but this doesn’t paint the picture. Pen registers record the numbers dialed from a specific phone number, but stingrays are used primarily to track the location and movement of a device and can be much more invasive than pen registers. By describing the tool as a pen register device to the judge, the law enforcement agency was withholding information about the full capability of the device.
In fact, the public has yet to learn exactly how much these surveillance tools can really do, due to the secrecy around them. Recently, a federal agent admitted to a court that stingrays have the ability to disrupt cellular communications for any device in its vicinity, not just the ones targeted by law enforcement. And there are also stingray devices that have the ability to collect the content of phone calls, though U.S. law enforcement agencies have often insisted that the ones they use have this capability disabled.
Although there’s still much more the public should know about how and when law enforcement uses this invasive spying tool, it’s clear departments will continue to do everything in their power to keep the public, and judges, in the dark.
Josh del Sol
A look at what utility companies, PUCs, and the former CIA director have to say about the ‘smart’ meters, data-mining, and surveillance — sans propaganda.
It’s always a drag to find out when a friend is saying one thing to your face, and another to your back. As uncovered in our film Take Back Your Power, the way in which most utilities are now delivering the lies and propaganda — with your individual rights, security, and potentially health on the line — is elevating the trait of “two-faced” to a completely new level.
It’s important to note that the first 4 of these references have to do with the smart meters / grid infrastructure capabilities as of this time. According to the sum of my research over the past 3 years, the plan involves achieving a greater and greater level of granularity and extraction of in-home data over time — see #5 and #6 below as examples (as well as my article on Google’s Nest acquisition). So as far as privacy and surveillance go, according to utilities’ own documentation and writings, ‘smart’ meters are effectively a trojan horse.
With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.
Source: https://www.fas.org/sgp/crs/misc/R42338.pdf – see page 7 (page 10 of the PDF)
First, the privacy concerns are real, and should be addressed proactively in order to protect consumers. Second and related, a salient privacy invasion—were it to happen and get press—could create significant opposition to smart grid deployment efforts.
3) California Public Utility Commission press release, “California Commission Adopts Rules to Protect the Privacy and Security of Customer Electricity Usage Data” (July 2011)
Our action today will protect the privacy and security of customer usage data while enablingutilities and authorized third-parties to use the information to provide useful energy management and conservation services to customers.
I support today’s decision because it adopts reasonable privacy and security rules and expandsconsumer and third-party access to electricity usage and pricing information. I hope this decision stimulates market interest.
4) SF Chronicle article, “California Utilities Yield Energy Use Data” (July 2013)
California’s electric utilities last year disclosed the energy-use records and other personal information of thousands of customers, according to reports the companies filed with state regulators.
The vast majority of those disclosures – 4,062 – were made by one utility, San Diego Gas and Electric Co. In 4,000 of those cases, the information was subpoenaed by government agencies.
New digital smart meters being installed throughout the state can measure a home’s energy use hour by hour, showing when residents leave for work, go to sleep or travel on vacation. Older analog meters, which measured cumulative energy use over the course of a month, couldn’t do that.
“Before smart meters, what happened inside houses couldn’t be revealed unless there was a police officer inside with a warrant,” Ozer said.
5) Raab & Associates, Steering Committee report (February 2013) – Under the heading “Strategic (3-10 years)”:
New tools for mining data for intel
Under the heading “Transformational (10+ years)”:
Centralized intel combined with widespread local/distributed intel
Data mining and analytics becomes core competency
View slide 17 only (PDF): http://www.takebackyourpower.net/documents/RaabDraft-17.pdf
6) Wired.com, “CIA Chief: We’ll Spy on You Through Your Dishwasher” (15 Mar 2012)
‘Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,’ Petraeus said, ‘the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.
“Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.”
* * *
Did we really think that the technocratic oligarchy would stop at collecting information about how we use our phones, who we call, and where we’re located? If we did, we were naive. Plainly, there is a corporate intention to effectively colonize your home.
However, there is also a rising awareness, and resistance, as new solutions are uncovered. The first step is to remove your consent, in writing.
The following is actually written into the California Civil Code. Not only do these provide a strong clue at how the corporatocracy functions (and gets away with what it does), but they also outline a basis for remedy: (notes in parentheses, italics)
California Civil Code (2009)
1619. A contract is either express or implied. (If you didn’t say no, you said yes.)
3515. He who consents to an act is not wronged by it. (The way they do business is in writing. If you didn’t send them a letter or notice to remove your consent, you have agreed to their terms, and thus have agreed to a reduction in rights.)
3521. He who takes the benefit must bear the burden. (Utilities and their executives – and many public servants – are taking the benefit. They must, according to their law, accept the liability for all harm if the liability is enforced.)
3523. For every wrong there is a remedy. (We are not bound into something which would have us be as slaves, if we do not want to be.)
3527. The law helps the vigilant, before those who sleep on their rights.
What statutes are YOUR utilities and governments bound by?
Former Defense Advanced Research Projects Agency (DARPA) director and now Google Executive, Regina E. Duncan, has unveiled a super small, ingestible microchip that we can all be expected to swallow by 2017. “A means of authentication,” she calls it, also called an electronic tattoo, which takes NSA spying to whole new levels. She talks of the ‘mechanical mismatch problem between machines and humans,’ and specifically targets 10 – 20 year olds in her rant about the wonderful qualities of this new technology that can stretch in the human body and still be functional.
Hailed as a ‘critical shift for research and medicine, ’ these biochips would not only allow full access to insurance companies and government agencies to our pharmaceutical med-taking compliancy (or lack thereof), but also a host of other aspects of our lives which are truly none of their business, and certainly an extension of the removal of our freedoms and rights.
The New York Times writes:
“These biochips look like the integrated circuits in a personal computer, but instead of containing tiny semiconductors, they are loaded with bits of actual DNA that make up genes or fragments of genes. Inserted in a PC-sized analytical instrument, the chips allow scientists to perform thousands of biochemical experiments at a fraction of the cost and time required for traditional tests.”
With bio-tech’s track record of hybridizing genes in our food and trees as GMO, why should we give them full access to our entire genetic makeup? With a satellite or the click of a button, these tiny micro-chips could also be set to begin our own demise, or even control our minds.
And the fact that microchipping has even been mentioned or considered in health care bills is insane:
“This new Health Care (Obamacare) law requires an RFID chip implanted in all of us. This chip will not only contain your personal information with tracking capability but it will also be linked to your bank account. And get this, Page 1004 of the new law (dictating the timing of this chip), reads, and I quote: ‘Not later than 36 months after the date of the enactment”. It is now the law of the land that by March 23rd 2013 we will all be required to have an RFID chip underneath our skin and this chip will be link to our bank accounts as well as have our personal records and tracking capability built into it…’”
This is not a new idea – Dr. Jose M.R. Delgado, Director of Neuropsychiatry Yale University Medical School Congressional Record, No. 26, Vol. 118 February 24, 1974 discusses it extensively in a paper in which he states, “Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain.”
Is this the kind of mind that is creating bio-tech warfare in the form of GMOs, chemtrails, and vaccines? Don’t sign me up for micro-chipping or high-tech tattoos. I trust the medical establishment and biotech about as far as I can throw a rotten, cancer-causing GMO apple.