Saturday, March 22, 2014

SUPERCOMPUTERS BEING USED TO PREDICT CRIME

Cities are increasingly using surveillance software running on supercomputers to monitor activity and develop a prediction as to what an individual, groups, or entire populations may be up to. For years TV shows and movies have shown law enforcement agencies using high-tech computers to predict crime or track down criminals. Now it seems this is no longer fiction or fantasy.
In Philadelphia, courts are using software to predict future behavior of current offenders in order to determine an appropriate amount of jail time. In many other cities such as San Francisco, Houston, and New York, software is in use to use artificial intelligence (AI) to monitor and learn what activities may signal a threat. These AI systems would potentially have the ability to shut dow n other systems, such as a subway, without human intervention. On an even larger scale,supercomputers are being tested to predict the behavior of entire populations.
We have written previously about what may constitute “suspicious activity” here.

GOV GIVEN POWER TO COLLECT, STORE & ANALYZE YOUR DATA FOR 5 YEARS

In new reports by the Wall Street Journal and Wired Magazine Attorney General Eric Holder secretly gave the National Counterterrorism Center the ability to develop and store vast amounts of information on U.S. citizens – even those who are suspected of nothing. This new authority gives the agency the green light to store data about individuals for 5 years and to analyze it for “suspicious activity” – powers it did not previously have. What, exactly, is “suspicious activity” that could mark someone as a “terrorist”? Read the list - you probably qualify.

VIA: TRUTHDEFICIT.COM

YOUR HOME IS NOT A SANCTUARY FROM SPYING

According to then-CIA Chief David Petraeus, our home will soon be full of internet-linked appliances that will monitor and track everything going on with them (and you), while also making them (and you) vulnerable to hacking and external control. Read all about it in here. Dishwashers, stoves, microwaves, washers, dryers, etc – they are all being equipped to wirelessly connect and make your home “Smart”.
A growing trend is also for power companies to change your old power meter on the outside of your home to a “Smart” meter that can be monitored and read via wireless technology. These meters are gaining more and more attention as health concerns are being brought to light, as well as privacy issues.
In very disturbing news, Verizon has developed a cable box that will watch and listen to everything going on in the room in an effort to target specific advertising. If you are having a discussion about buying a new sofa, for instance, a furniture commercial would come on. Click here to see the patent. The technology to watch and listen already exists in Microsoft’s X-Box Kinect system, and Google and Comcast are in on the action as well.
For a REALLY creepy eye-opener, watch this video. Newer TVs can be hacked, and the technology that makes them really “cool” can then be used against the owner.

ARTICLE VIA: TRUTHDEFICIT.COM

BLACK BOXES TO TRACK YOUR EVERY MOVE

In yet another example of the police state that is being built to monitor, track, and record everything we do, the U.S. Department of Transportation’s National Highway Traffic Safety Administration (NHTSA) has created a new standard that will require the recording of ”safety-related data” using a “black box” similar to what is used in airliners. The devices are to be mandated on all light vehicles in the next few years – meaning the cars and trucks we all drive.
It is always in the name of  “safety” that we lose our freedoms and right to privacy. Another code phrase is “for the children.” That is my favorite.
According to the NHTSA, the boxes will be the propoerty of the owner of the vehicile and data would only be retrieved with owner consent. And did I tell you about the bridge I have to sell…?
ARTICLE VIA: TRUTHDEFICIT.COM

DRONES, DRONES, EVERYWHERE DRONES

Most people don't know about the existence of quantum computers. Almost no one understands how they work, but theories include bizarre-sounding explanations like, "they reach into alternate universes to derive the correct answers to highly complex computational problems."
Quantum computers are not made of simple transistors and logic gates like the CPU on your PC. They don't even function in ways that seem rational to a typical computing engineer. Almost magically, quantum computers take logarithmic problems and transform them into "flat" computations whose answers seem to appear from an alternate dimension.
For example, a mathematical problem that might have 2 to the power of n possible solutions -- where n is a large number like 1024 -- might take a traditional computer longer than the age of the universe to solve. A quantum computer, on the other hand, might solve the same problem in mere minutes because it quite literally operates across multiple dimensions simultaneously.

The ultimate code breakers

If you know anything about encryption, you probably also realize that quantum computers are the secret KEY to unlocking all encrypted files. As I wrote about last year here on Natural News, once quantum computers go into widespread use by the NSA, the CIA, Google, etc., there will be no more secrets kept from the government. All your files -- even encrypted files -- will be easily opened and read.
Until now, most people believed this day was far away. Quantum computing is an "impractical pipe dream," we've been told by scowling scientists and "flat Earth" computer engineers. "It's not possible to build a 512-qubit quantum computer that actually works," they insisted.
Don't tell that to Eric Ladizinsky, co-founder and chief scientist of a company called D-Wave. Because Ladizinsky's team has already built a 512-qubit quantum computer. And they're already selling them to wealthy corporations, too. READ MORE AT TRUTHDEFICIT.COM

Saturday, October 12, 2013

SURVEILLANCE


A Growing Concern

Privacy has always been the greatest treasure of a free people.  When those in authority seek to remove a people's privacy, you may be assured that they seek to remove their freedom as well.  One of the greatest privileges we have enjoyed in this Country is the freedom to live, move and transact business while maintaining our privacy.  It is what has set us apart from many other oppressive countries around the world.

Yet today, our privacies are being violated in ways too numerous to count and in ways most do not even realize, because there is a truth deficit in the main stream media.  The Government now has seized vast power over the American people through a growing network of surveillance and the invasion of our privacy in ways many never thought possible.

Each and every day it seems that some new revelation is made about the growing surveillance system in our nation.  We are now even being told that our medical records (among our most private information) is to be shared with those in positions of government.  What can this accomplish but to further erode our already limited privacy?

Technology in the Hands of a Tyrant

When one group of people seizes power of another group of people, one of their main objectives is to hold on to that power.  We are living in a land today where every aspect of our lives is being monitored and recorded.  The extent of the surveillance systems in place is staggering.  It is almost certain that hardly a day goes by without some part of your activity being monitored or recorded.
  • Recording of web searches
  • Accessing telephone records
  • License plate scanners
  • Networks of CCTV cameras everywhere 
  • Biometrics and facial recognition scanners
The impact of these systems on the privacy of everyday, law-abiding citizens is staggering.  The argument is made that if you are not doing anything illegal, then you have nothing to worry about.  The fact is that whether we are doing anything illegal or not has nothing to do with our right to our own privacy.  Again, a free people are a people with a right to privacy.  Free people have the right to live their lives free of surveillance, and having their every move, whether physical or digital, recorded by government.

While the surveillance state grows, we are told to trust those in power, not to abuse that power.  One thing about power is certain.   It cannot be trusted to restrain itself.  Unrestrained power will soon become corrupted power. 

In the Future

We can expect the widespread use of surveillance and truth deficit about it to grow worse in the years ahead.  Citizens should be vigilant about their privacy and be careful about how much information they willingly give up.  Again, it is not about being guilty of anything or not. It is about our right to privacy and the lack of right any government has to violating that privacy, regardless of their reason for claiming to need it.

Unfortunately today, many people are willing to give up their privacy for vague promises of security.  Don't believe it.  Whatever security we receive in exchange for our privacy is a trade not worth making.