Tag Archives: surveillance

“Alexa, How Do We Subvert Big Tech’s Orwellian Internet-of-Things Surveillance?”

Convenience is the sales pitch, but the real goal is control in service of maximizing profits and extending state power.

When every device in your life is connected to the Internet (the Internet of Things), your refrigerator will schedule an oil change for your car–or something like that–and it will be amazingly wunnerful. You’ll be able to lower the temperature of your home office while you’re stuck in a traffic jam, while your fridge orders another jar of pickles delivered to your door.

It’s all in service of convenience, the god all Americans are brainwashed to worship. Imagine the convenience of turning on the light while seated on your sofa! Mind-boggling convenience at your fingertips–and since you’re already clutching your smart phone 24/7, convenience is indeed at your fingertips.

It’s also about control, and as we lose control of everything that’s actually important in our lives, the illusion of agency/control is a compelling pitch. Imagine being able to program your fridge to order a quart of milk delivered when it gets low but not order another jar of pickles when that gets low! Wow! That’s control, yowzah.

The Internet of Things is indeed about control–not your control, but control over you— control of what’s marketed to you, and control of your behaviors via control of the incentives, distractions and micro-decisions that shape behavior.

I Used Google Ads for Social Engineering. It Worked. (via Mark J.)

The control enabled by the Internet of Things starts with persuasion and quickly slides into coercion. Since corporations and government agencies will have a complete map of your movements, purchases, consumption, communications, etc., then behavior flagged as “non-beneficial” will be flagged for “nudging nags”, while “unsanctioned” behavior will be directed to the proper authorities.

Say you’re visiting a fast-food outlet for the fourth time in a week. Your health insurance corporation has set three visits a week as a maximum, lest your poor lifestyle choices start costing them money for treatments, so you get a friendly “reminder” to lay off the fast food or make “healthier” choices off the fast food menu.

Failure to heed the “nudges” will result in higher premiums or cancelled coverage. Sorry, pal, it’s just business. Your “freedom” doesn’t extend to costing us money.

Domestic corporate versions of China’s social credit score will proliferate. Here is evidence that such scores already exist:

Everyone’s Got A “Surveillance Score” And It Can Cost You Big Money (Zero Hedge)

Then there’s the surveillance. The Internet of Things isn’t just monitoring energy use and the quantity of milk in a fridge; it’s monitoring you–not just in your house, car and wherever you take your Personal Surveillance Device, i.e. your smart phone, but everywhere you go.

If you are a lookie-loo shopper–you browse the inventory but rarely buy anything–expect to be put in Category Three–zero customer service, and heightened surveillance in case your intent is to boost some goodies (shoplift).

Heaven help you if you start spending time reading shadow-banned websites like Of Two Minds: your social credit standing moves into the red zone, and your biometric scans at airports, concerts, retail centers etc., will attract higher scrutiny. You just can’t be too sure about people who stray off the reservation of “approved” corporate media.

Your impulses are easy to exploit: since every purchase is tracked, your vulnerabilities to impulse buys will be visible with a bit of routine Big Data analysis, and so the price of the treats you succumb to will go up compared to the indifferent consumer next to you. Sorry, pal, it’s just business. Your vulnerabilities, insecurities and weaknesses are profit centers. We’d be foolish not to exploit them to maximize profits, because that is the sole mission of global corporations.

Governments access the trove of surveillance for their own purposes.Monitoring phone calls, texts and emails is only the first step; privacy as a concept and a right has effectively ceased to exist other than as a legal abstraction and useful fiction. The Dawn Of Robot Surveillance: AI, Video Analytics, and Privacy.

Longtime correspondent Simon H. recently submitted a video link on The Internet of Things as well as a sobering and insightful commentary.

Here is an overview by James Corbett of the totalitarian reach of the 5G IoT and a technocratic surveillance dictatorship. All delivered as an unavoidable facet of inevitable tech progress.

The 5G Dragnet

There seems to be an idea that the only reason we have historically had privacy, civil liberties and general freedoms is because in the past we lacked the technology to eliminate them.

The future does indeed seem to have globalist technocracy written all over it which is to be presented as a simple matter of embracing technological progress and celebrating new technological wonders. Don’t think about the total surveillance taking place just marvel at the speed of your connections and the convenience of outsourcing all of your troubling personal sovereignty to machine assistants to make all of your decisions for you.

Anyone who resists this undemocratic future will be branded as a nostalgically foolish, technological Luddite. However, this new form of tech is completely different in nature to all of those that have preceded it. If we think in terms of macro and micro economics, then we can also look at current developments in terms of macro and micro sovereignties. This phenomenon is more pronounced in the UK than the US because of the sovereignty issues of the EU and Brexit.

Not only is our democratic sovereignty being eroded by supranational organization such as the EU, the IMF, the IPCC, markets and the central banking masters of the economic universe, etc., if we take surveillance capitalism, 5G and the Internet of Things (IoT) into consideration one can see that our sovereignty it is also under direct dual attack at an extreme and fundamentally personal level.

Against all of these things we are seeing extraordinary coalitions of resistance: Marxists, Anti-Capitalists, Anarchists, Austrian Libertarians and anyone of an old school left of right wing true liberalism who believe in the principles of democracy and sovereignty, freedom of speech, privacy and civil liberties.

The so called liberal progressives who support globalism and the technocracy are anything but liberal: they are imperialist totalitarians no better or less dangerous than the Nazis. We desperately need to strip them of their fake liberal and moderate claims and show them for what they truly are — sociopaths.

Thank you, Simon. Resistance can take many forms.

One approach is to minimize surveillance by stripping out apps from your smart phone, leaving it in a drawer most of the time, and disabling wifi in all appliances and devices you buy/own. This approach isn’t perfect, as surveillance is far beyond our control, despite Big Tech claims of transparency, privacy controls, etc., but nonetheless any reduction in data collection is meaningful.

More than 1,000 Android apps harvest data even after you deny permissions (via Mark J.)

Buy with cash and buy the absolute minimum. If you only buy real food–meats, vegetables, grains, fruit, etc.–you’ve effectively stripped out all the profit potential of our corporate overlords. Who is going to make a big profit offering you a discount on raw carrots? No one.

If your impulse buys are paid with cash, they can’t be tracked. Whatever you buy in person with cash can’t be tracked.

Limit your Personal Surveillance Device, i.e. your smart phone: disable its “always listening” and other capabilities; leave it in the drawer, etc.

How to Turn an Android Phone Into a Dumbphone in 8 Steps

Understand you’re being played and gamed 24/7; ignore all the marketing, pitches and propaganda. Make it a habit to ignore all marketing pitches, discounts, coupons, etc. Become an anti-consumer, minimizing trackable purchases and pursuing a DeGrowth lifestyle of repairing existing items and making everything you own last rather than replace it with a new item (this is the Landfill Economy I’ve discussed many times, with thanks to correspondent Bart D. who coined the phrase to the best of my knowledge).

Don’t buy wifi-enabled devices, and disable wifi if there are no non-wifi options available.

This subverts the value of the data Facebook, Google, et al. collect on you and sell to the highest bidder. If the data isn’t useful in selling you something, then the buyers of the data will at a minimum weed the non-controllable consumers out of the data pool.

Since any deviance outside “normal” attracts scrutiny, game the system by logging a baseline of “normal” purchases and activities. Appearing minimally ordinary has its advantages. Trying too hard to leave no digital footprint is itself highly suspicious.

Advocate for digital privacy / Freedom from Surveillance and AI Bill of Rights.There is still a narrow window in the U.S. for protecting and expanding civil liberties and privacy. Here is an example of a proposed Algorithmic Bill of Rights:

Convenience is the sales pitch, but the real goal is control in service of maximizing profits and extending state power. “To serve humans” takes on new meanings in Big Tech/ Big Government’s Orwellian the Internet of Things: To Serve Man (The Twilight Zone).

Source: by Charles Huge Smith | ZeroHedge

Advertisements

The Gov’t Wants To Outlaw Encrypted Messaging In iMessage, WhatsApp, Signal, Wickr, Telegram, …

If you ever use the encrypted messaging options on programs like iMessage, WhatsApp, Signal, Wickr, Telegram, or any other service, your time to discuss things privately over the phone may be running out. The US government doesn’t like for anything to get in the way of their ability to spy on investigate even the most mundane of conversations.

https://www.zerohedge.com/s3/files/inline-images/shutterstock_backdoor.jpg?itok=9jPbtRUx

Instead of seeing privacy as a right, they see it as suspicious. Your devices are already being searched at quadruple the previous rate in airports. And the attack on free speech is now going as far as our private messages to our friends and family.

Because the only reason we’d want privacy is that we’re criminals

This was the topic of a National Security meeting last week.

Continue reading

All Four Major Wireless Carriers Hit With Lawsuits Over Sharing, Selling Location Data

(TechDirt) We’ve noted repeatedly that if you’re upset about Facebook’s privacy scandals, you should be equally concerned about the wireless industry’s ongoing location data scandals. Not only were the major carriers caught selling your location data to any nitwit with a checkbook, they were even found to be selling your E-911 location data, which provides even more granular detail about your data than GPS provides. This data was then found to have been widely abused from everybody from law enforcement to randos pretending to be law enforcement.

Throughout all this, the Ajit Pai FCC has done absolutely nothing to seriously police the problem. Meaning that while carriers have promised to stop collecting and selling this data, nobody has bothered to force carriers to actually confirm this. Given telecom’s history when it comes to consumer privacy, somebody might just want to double check their math (and ask what happened to all that data already collected and sold over the last decade).

Compounding carrier problems, all four major wireless carriers last week were hit with a class action lawsuit (correctly) noting the carriers had violated Section 222 of the Federal Communications Act by selling consumer proprietary network information (CPNI) data:

“Through its negligent and deliberate acts, including inexplicable failures to follow its own Privacy Policy, T-Mobile permitted access to Plaintiffs and Class Members’ CPI and CPNI,” the complaint against T-Mobile reads, referring to “confidential proprietary information” and “customer proprietary network information,” the latter of which includes location data.”

It’s likely that the sale of 911 data is where carriers are in the most hot water, since that’s their most obvious infraction of the law. It’s of course worth pointing out that wireless carriers (and fixed-line ISPs, frankly) have been hoovering up and selling location, clickstream, and a vast ocean of other user data for decades with very few (any?) Congressional lawmakers much caring about it. It’s another example of how Facebook’s cavalier treatment of user data (and government apathy toward meaningful solutions) isn’t just some errant exception — it’s the norm.

Back in 2016, the previous FCC uncharacteristically tried to impose some pretty basic rules that would have gone a long way in preventing these location data scandals by requiring that carriers be more transparent about what data is collected and who it’s sold to. It also required consumers opt in to more sensitive (read: financial, location) data. But telecom lobbyists quickly convinced Congress to obliterate those rules in 2017 using the Congressional Review Act before they could even take effect.

Two years later finds the sector swimming in scandal, and everybody has a dumb look on their faces utterly perplexed as to how we got to this point.

Source: TechDirt

UK Cops Fine Pedestrian $115 For Avoiding Facial Recognition Camera

A UK pedestrian was arrested and fined £90 ($115 US) after attempting to cover his face while passing a controversial facial recognition camera van on a East London street. The notorious London police vans scan the faces of passers-by and compare them to a database of wanted criminals.

https://www.zerohedge.com/s3/files/inline-images/facial-recognition-van%20%281%29.jpg?itok=wWFB2h3j

One man wasn’t having any of it, and was seen covering his face with his hat and jacket before London police stopped him and took his picture anyway according to the Daily Mail

https://www.zerohedge.com/s3/files/inline-images/bbc%20click.jpg?itok=hncBlJtM

If I want to cover me face, I’ll cover me face. Don’t push me over when I’m walking down the street,” said the man after his stop. 

“How would you like it if you walked down the street and someone grabbed your shoulder? You wouldn’t like it, would you?” the man asked an officer, who replied “Calm yourself down or you’re going in handcuffs. It’s up to you. Wind your neck in.” 

“You wind your neck in,” the man replied.

https://www.zerohedge.com/s3/files/inline-images/man%20van.jpg?itok=fdcuWtK8

After being fined, the man told a reporter: ‘The chap told me down the road – he said they’ve got facial recognition. So I walked past like that (covering my face).

‘It’s a cold day as well. As soon as I’ve done that, the police officer’s asked me to come to him. So I’ve got me back up. I said to him ‘f*** off’, basically.  

‘I said ‘I don’t want me face shown on anything. If I want to cover me face, I’ll cover me face, it’s not for them to tell me not to cover me face. 

‘I’ve got a now £90 fine, here you go, look at that. Thanks lads, £90. Well done.’ –Daily Mail

The ticketing comes in the wake of another similar incident in February, in which another man refused to be scanned by one of the facial recognition vans and was also fined £90. 

He simply pulled up the top of his jumper over the bottom of his face, put his head down and walked past,” said Silkie Carlo, director of Big Brother Watch, who added that at least one man had seen placards warning the public of the facial recognition cameras being used from a parked police van.

“There was nothing suspicious about him at all … you have the right to avoid [the cameras], you have the right to cover your face. I think he was exercising his rights,” said Carlo.

Meanwhile, the technology is terribly inaccurate – wrongly matching over 2,000 people to criminals when it was deployed ahead of the Champions League Final in Cardiff in 2017. 

Last December, a suspect was arrested by the Metropolitan Police during a trial of the facial recognition technology among Christmas shoppers at Leicester Square in London’s West End.  

Another man was stopped due to the technology, but found not to be the man the computer thought he was – although he was arrested over another offence. 

Big Brother Watch has previously said the technology is a ‘breach of fundamental rights to privacy and freedom of assembly’. –Daily Mail

“It is important to note that police are now days away from making a decision about the future of facial recognition in the UK,” Carlo told MailOnline. “We believe it has no place in a democracy and we will continue with our legal challenge against the Met if they do go ahead with it.

Source: ZeroHedge

China’s Mass Surveillance App Hacked; Code Reveals Specific Criteria For Illegal Oppression

Human Rights Watch got their hands on an app used by Chinese authorities in the western Xinjiang region to surveil, track and categorize the entire local population – particularly the 13 million or so Turkic Muslims subject to heightened scrutiny, of which around one million are thought to live in cultural ‘re-education’ camps

https://www.zerohedge.com/s3/files/inline-images/china%20uyghur-detainees1_0.jpg?itok=tDgTAr-t

By “reverse engineering” the code in the “Integrated Joint Operations Platform” (IJOP) app, HRW was able to identify the exact criteria authorities rely on to ‘maintain social order.’ Of note, IJOP is “central to a larger ecosystem of social monitoring and control in the region,” and similar to systems being deployed throughout the entire country. 

The platform targets 36 types of people for data collection, from those who have “collected money or materials for mosques with enthusiasm,” to people who stop using smartphones. 

[A]uthorities are collecting massive amounts of personal information—from the color of a person’s car to their height down to the precise centimeter—and feeding it into the IJOP central system, linking that data to the person’s national identification card number. Our analysis also shows that Xinjiang authorities consider many forms of lawful, everyday, non-violent behavior—such as “not socializing with neighbors, often avoiding using the front door”—as suspicious. The app also labels the use of 51 network tools as suspicious, including many Virtual Private Networks (VPNs) and encrypted communication tools, such as WhatsApp and Viber. –Human Rights Watch

https://www.zerohedge.com/s3/files/inline-images/hrw%20look%20for.jpg?itok=H4u3swit(full size image)

Another method of tracking is the “Four Associations”

The IJOP app suggests Xinjiang authorities track people’s personal relationships and consider broad categories of relationship problematic. One category of problematic relationships is called “Four Associations” (四关联), which the source code suggests refers to people who are “linked to the clues of cases” (关联案件线索), people “linked to those on the run” (关联在逃人员), people “linked to those abroad” (关联境外人员), and people “linked to those who are being especially watched” (关联关注人员). –HRW

*An extremely detailed look at the data collected and how the app works can be found in the actual report.

https://www.zerohedge.com/s3/files/inline-images/chinese%20cops_0.jpg?itok=hR9nuBo2

HRW notes that “Many—perhaps all—of the mass surveillance practices described in this report appear to be contrary to Chinese law, and also violate internationally guaranteed rights to privacy, the presumption of innocence, and freedom of association and movement. “Their impact on other rights, such as freedom of expression and religion, is profound,” according to the report. 

Here’s what happens when ‘irregularities’ are detected:

When IJOP detects a deviation from normal parameters, such as when a person uses a phone not registered to them, or when they use more electricity than what would be considered “normal,” or when they travel to an unauthorized area without police permission, the system flags them as “micro-clues” which authorities use to gauge the level of suspicion a citizen should fall under. 

https://www.zerohedge.com/s3/files/inline-images/check%20point.jpg?itok=YeGm8y95

A checkpoint in Turpan, Xinjiang equiped with machines that verify ID, facial recognition and retrieve data from personal electronic divices for analysis.

IJOP also monitors personal relationships – some of which are deemed inherently suspicious, such as relatives who have obtained new phone numbers or who maintain foreign links. 

Chinese authorities justify the surveillance as a means to fight terrorism. To that end, IJOP checks for terrorist content and “violent audio-viusual content” when surveilling phones and software. It also flags “adherents of Wahhabism,” the ultra-conservative form of Islam accused of being a “source of global terrorism.

A former Xinjiang resident told Human Rights Watch a week after he was released from arbitrary detention: “I was entering a mall, and an orange alarm went off.” The police came and took him to a police station. “I said to them, ‘I was in a detention center and you guys released me because I was innocent.’… The police told me, ‘Just don’t go to any public places.’… I said, ‘What do I do now? Just stay home?’ He said, ‘Yes, that’s better than this, right?’” –Human Rights Watch

The IJOP system was developed by a major-state owned military contractor – the China Electronics Technology Group Corporation (CETC). The app itself was developed by Hebei Far East Communication System Engineering Company (HBFEC), a company that, at the time of the app’s development, was fully owned by CETC. 

https://www.zerohedge.com/s3/files/inline-images/Chinese%20muslim%20scanner.jpg?itok=MkGNt7Jr

3D portrait and integrated data capturing passage.

Meanwhile, under the broader “Strike Hard Campaign, authorities in Xinjiang are also collecting “biometrics, including DNA samples, fingerprints, iris scans, and blood types of all residents in the region ages 12 to 65,” according to the report, which adds that “the authorities require residents to give voice samples when they apply for passports.

The Strike Hard Campaign has shown complete disregard for the rights of Turkic Muslims to be presumed innocent until proven guilty. In Xinjiang, authorities have created a system that considers individuals suspicious based on broad and dubious criteria, and then generates lists of people to be evaluated by officials for detention. Official documents state that individuals “who ought to be taken, should be taken,” suggesting the goal is to maximize the number of people they find “untrustworthy” in detention. Such people are then subjected to police interrogation without basic procedural protections. They have no right to legal counsel, and some are subjected to torture and mistreatment, for which they have no effective redress, as we have documented in our September 2018 report. The result is Chinese authorities, bolstered by technology, arbitrarily and indefinitely detaining Turkic Muslims in Xinjiang en masse for actions and behavior that are not crimes under Chinese law.

Read the entire report from Human Rights Watch here.

https://hcsblogdotorg.files.wordpress.com/2019/05/zip.jpg

Source: ZeroHedge

 

Google Tracks Your Location and Shares It With Police, Even When Your Phone is Off

Even if you disable GPS, deactivate phone location tracking, and turn off your phone, it’s still possible for Google and the NSA to monitor your every move.

https://themindunleashed.com/wp-content/uploads/2019/04/google-tracks-your-location-police-phone-off.jpg

Over the last two decades, cell phone use has become an everyday part of life for the vast majority of people around the planet. Nearly without question, consumers have chosen to carry these increasingly smart devices with them everywhere they go. Despite surveillance revelations from whistleblowers like Edward Snowden, the average smart phone user continues to carry the devices with little to no security or protection from privacy invasions.

Americans make up one of the largest smartphone markets in the world today, yet they rarely question how intelligence agencies or private corporations might be using their smartphone data. A recent report from the New York Times adds to the growing list of reasons why Americans should be asking these questions. According to the Times, law enforcement have been using a secret technique to figure out the location of Android users. The technique involves gathering detailed location data collected by Google from Android phones, iPhones, and iPads that have Google Maps and other Google apps installed.

The location data is stored inside a Google database known as Sensorvault, which contains detailed location records of hundreds of millions of devices from around the world. The records reportedly contain location data going back to 2009. The data is collected whether or not users are making calls or using apps.

The Electronic Frontier Foundation (EFF) says police are using a single warrant—sometimes known as a “geo-fence” warrant—to access location data from devices that are linked to individuals who have no connection to criminal activity and have not provided any reasonable suspicion of a crime. Jennifer Lynch, EFF’s Surveillance Litigation Director, says these searches are problematic for several reasons.

First, unlike other methods of investigation used by the police, the police don’t start with an actual suspect or even a target device—they work backward from a location and time to identify a suspect,” Lynch wrote. “This makes it a fishing expedition—the very kind of search that the Fourth Amendment was intended to prevent. Searches like these—where the only information the police have is that a crime has occurred—are much more likely to implicate innocent people who just happen to be in the wrong place at the wrong time. Every device owner in the area during the time at issue becomes a suspect—for no other reason than that they own a device that shares location information with Google.”

The problems associated with Sensorvault have also concerned a bipartisan group of lawmakers who recently sent a letter to Google CEO Sundar Pichai. The letter from Democrats and Republicans on the U.S. House Energy and Commerce Committee gives Google until May 10 to provide information on how this data is used and shared. The letter was signed by Democratic Representatives Frank Pallone and Jan Schakowsky and Republicans Greg Walden and Cathy McMorris Rodgers.

Google has responded to the report from the Times by stating that users opt in to collection of the location data stored in Sensorvault. A Google representative also told the lawmakers that users “can delete their location history data, or turn off the product entirely, at any time.” Unfortunately, this explanation falls flat when one considers that Android devices log location data by default and that it is notoriously difficult to opt out of data collection.

No matter what promises Google makes, readers should remember that back in 2010, the Washington Post published a story focusing on the growth of surveillance by the National Security Agency. That report detailed an NSA technique that “enabled the agency to find cellphones even when they were turned off.” The technique was reportedly first used in Iraq in pursuit of terrorist targets. Additionally, it was reported in 2016 that a technique known as a “roving bug” allowed FBI agents to eavesdrop on conversations that took place near cellphones.

These tools are now undoubtedly being used on Americans. The reality is that these tools—and many, many others that have been revealed—are being used to spy on innocent Americans, not only violent criminals or suspects. The only way to push back against this invasive surveillance is to stop supporting the companies responsible for the techniques and data sharing. Those who value privacy should invest time in learning how to protect data and digital devices. Privacy is quickly becoming a relic of a past era and the only way to stop it is to raise awareness, opt-out of corporations that don’t respect privacy, and protect your data.

Source: by Derrick Broz | The Mind Unleashed

They’ve Turned San Diego Into A China-Style Public Surveillance Network

Can you imagine a city in the United States secretly creating a Chinese-style public surveillance network that can identify everyone? Can you imagine that same city secretly creating a Chinese-style public watchlisting network?

Well imagine no more because it has already happened.

When I wrote about “covert facial recognition streetlights coming to a city near you” last year, I never would have dreamt that my article would become a reality so quickly.

A recent article in the San Diego Reader reveals how a hacker discovered emails between the Port of San Diego and BriefCam. The emails revealed that law enforcement is secretly using a network of 400 facial recognition surveillance cameras to identify everyone.

Last year, BriefCam announced a “breakthrough” in real-time facial recognition surveillance.

Robust multi-camera search capabilities identify men, women, children and vehicles with speed and precision, using 25 classes and attributes, face recognition, appearance similarity, color, size, speed, path, direction, and dwell time.

According to another article, the City of San Diego is using GE’s CityIQ streetlights to listen to everyone.

In 2017, civil rights advocates sent a letter to the mayor and city council asking the city not to install GE’s streetlights.

Devices capable of monitoring and recording residents invade privacy, chill free speech, and disparately impact communities of color.

But as the article revealed, San Diego ignored the public’s concerns and secretly installed 3200 spying GE streetlights.

GE’s spying streetlights have effectively “turned the city into a stealthy laboratory for infrastructure-embedded intelligence collecting with devices regularly used by the DEA, ICE and other security agencies.” (To learn more about San Diego’s spying streetlights click here.)

An email from BriefCam’s Western Region sales director, Erik Wade, sheds some light on who is really behind San Diego’s public surveillance network.

“I am currently working with SDPD to deploy BriefCam at their new Real Time Crime Center (RTCC) for the entire city, which would greatly help you as some of the camera coverage would benefit each other”, Wade said.

Just how close is BriefCam and DHS?

Last year BriefCam announced that they won the 2018 Gold ‘ASTORS’ Homeland Security Award, calling it a “prestigious program that is designed to honor distinguished government and vendor solutions.”

I wish I could say that I am surprised to learn that private companies are working with Homeland Security, but this has been happening since 9/11.

San Diego has created a public watchlisting network

What I was surprised to learn about is how San Diego law enforcement has secretly created a public watchlisting network.

Buried in BriefCam’s “breakthrough” announcement is an admission that boggles the mind.

San Diego’s law enforcement is using BriefCam to create “precise face recognition [that] rapidly pinpoints people of interest in real-time using digital images extracted from video, external image sources and pre-defined watchlists.”

Watchlisting people is a major selling point for BriefCam, “our scalable watchlist management enables rapid and powerful rule configuration.” 

When I called 2018: The Year Public Watchlists Became Commonplace I was not joking, and here is another smoking gun to prove it.

The town of Ipswich, MA recently announced that they just became the first town in America to create a public watchlisting network.

Watchlisting hundreds of thousands of children and their families is big business.

Last year BriefCam announced that they used their surveillance cameras to identify children and their families during the 2018 Little League World Series in South Williamsport, PA.

“Each year, hundreds of thousands of people come out to Williamsport to enjoy their time at the Little League Baseball World Series,” said Jim Ferguson, Little League Assistant Director of Risk Management and Safety.

As Vanity Fair warned: the real purpose behind turning our cities into a mirror image of China is to “make people more obedient” and that is surveillance politics in a nutshell.

Source: Activist Post