Posts Tagged ‘Spooks’

Ignorance Is Futile:

It wasn’t until I saw my employer pull out a new Android phone recently did I realized the next level in privacy matters: business trade secrets.

You’d be hard pressed to find a much stauncher critic of cute & cuddly Google than yours truly, yet somehow I hadn’t pondered this realm. Of course I started with ‘No, now Google can track your every move, and listen in on your daily routine’, and of course in response I got “if I’m not a terrorist then what do I care”. Never mind that we all have only certain things that we’ll say in front of certain people, yet now we’re supposed embrace evil governments and corporations tracking our every move and cataloging our every breath of spoken word?

The thing about these phones is they don’t merely listen in while you talk on them, they listen in virtually all the time as we’ll see below. It stands to reason that the camera is also always looking for imagery worth cataloging. These arguments, and my barrage of many others were stonewalled with the general idea that “to stay competitive in the business world I need the latest technology”. After hearing this enough times it occurred to me that Google seems to have set themselves up for the ultimate scheme in mass scale industrial espionage.

I’ll remind everyone that federal law mandates that cell phone manufacturers include built-in GPS for ‘9-1-1 locating’ (tracking) purposes. Furthermore, spook agencies such as the FBI can activate your phones microphone and listen in on anything the microphone can pick up. They can even do this while the phone is shut off, as reported by, believe it or not, Fox News:

In 2008, when Google was launching the Android, it became obvious to me that Google had set out to make people want to be tracked by GPS. Then and even still it just doesn’t occur to people that they’re being tracked by these devices. One odd Android launch applet even had you broadcasting your location to -whoever- to brag about when you’re cooking dinner. As they say, you can’t make this stuff up. Today they apparently have something on the order of 50,000 applets, and you can bet something around half of those have something to do with GPS.

Or course the federal government has had the ability to track us since at least 2005. Recently it was reported that Verizon and T-Mobile save your location information next to all of your phone call records. Meanwhile, back in February Obama’s Justice Dept. fought to keep the ‘right’ for virtually all law enforcement officers and agents to use our phones to to track and monitor us without a warrant.

So it’s already bad enough that we have this despotic government tracking us like slaves in a rat maze, even when it comes to industry trade secrets:

The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).
www.fas.org…

Hearing such allegations isn’t much of a surprise to me, but now we’re talking about a private corporation, Google (that is now partnered with the NSA), being on the direct receiving end of your communications and whereabouts.

As stated earlier, Google will also be listening on your entire day, not just your phone calls. This is a pretty easy allegation to make, considering that in 2006 Google went on the record stating that they’ll be listening to peoples daily routines by tapping their computer microphones, and with other ‘real world products’.

The idea appeared in Technology Review citing Peter Norvig, director of research at Google, who says these ideas will show up eventually in real Google products – sooner rather than later.

The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject.

And, of course, we wouldn’t put it past Google to store that information away, along with the search terms it keeps that you’ve used, and the web pages you have visited, to help it create a personalised profile that feeds you just the right kind of adverts/content. And given that it is trying to develop alternative approaches to TV advertising, it could go the extra step and help send “content relevant” advertising to your TV as well. www.theregister.co.uk…

So now we’re supposed to trust Google with our web searches, our web travels, emails, phone calls & text messages, GPS location, our daily routines and conversations, and a number of other things? This is the same Google who is directly linked with the NSA, CIA, DARPA, NASA and even the National Science Foundation. The NSF can’t be bad can they?

Take the example of “personal maps” explained by NSF bigshot Mihail Roco. In his book, “Progress in Convergence”, he supports the use of raw GPS data in tracking peoples personal daily movements. He explains:

“over the last years, estimating a person’s activities has gained increased interest in the artificial intelligence, robotics, and ubiquitous computing communities.”

He continues:

“the concept of a personal map, which is customized based on an individual’s behavior. A personal map includes personally significant places, such as home, a workplace, shopping centers, and meeting places and personally significant routes (i.e., the paths and transportation modes, such as foot, car, or bus, that the person usually uses to travel from place to place). In contrast with general maps, a personal map is customized and primarily useful for a given person. Because of the customization, it is well suited for recognizing an individual’s behavior and offering detailed personalized help.”

It goes on to highlight the use of AI powered personal maps to discriminate a targets activities, predict future movements and transportation modes and infer when the target has broken their ordinary routine. (See the full paper on this key point.)

So it sounds like the NSF has found in Google their solution to the “personal maps” ‘problem’. (Technocrats always refer to non-achieved ideas, no matter how alarming & dastardly, as “problems” that need to be ‘solved’.) This is assuming that the NSA hasn’t already been using AI “personal maps” software as described by Roco, but I posit that they likely needed Google’s advanced AI systems integrated into their own in order to effectively track and catalog everybody. Aside from the Google-NSF ‘merger’, I normally argue that it’s bad enough that the FedGov is tracking us, but at least by not using Android corporations like Google don’t have a direct link into our pockets. In any case, the NSA & Google ‘are a match made in hell‘.

Now consider Android’s Machine Vision features. One form that comes to mind is “Biowallet”, which is a biometric iris scanner applet that won in the first round of Google’s Android “developers challenge”. I hate to think of how many there must be out there who think it would be so cool to give their iris scan to Google and the federal government, using Android.

Another thrust in Google’s machine vision activities in recent years is video facial recognition and object recognition. Google’s quest is to monitor the real world in real time, like a reality TV version of Google Earth with Street View. By the way, Google acquired the technology to build Google Maps & Google Earth from a CIA venture firm project by In-Q-Tel. (www.resourceshelf.com… )

Neven Vision comes to Google with deep technology and expertise around automatically extracting information from a photo. It could be as simple as detecting whether or not a photo contains a person, or, one day, as complex as recognizing people, places, and objects. This technology just may make it a lot easier for you to organize and find the photos you care about. We don’t have any specific features to show off today, but we’re looking forward to having more to share with you soon.
www.searchenginejournal.com…

Here’s a recent example of another firms success in biometric identity acquisition:

Now many might say ‘they don’t have enough people to do all that work’, but Google’s mastery of artificial intelligence has The Machine do this work for them. Their system is so remarkable that when you use Google’s services you don’t only fund their operation, but you also help make it smarter to be even more powerful. As I argued in October 2008:

“An intelligent thinking machine would also needs ears, and ears they are giving it. Make a call to 1-800-GOOG411 and experience their speech recognition algorithms for yourself. No surprise that the service is free, because the more people use it the more you help them reach their goal of omniscience.”

As I was proven correct in November 2008:

If you own an iPhone, you can now be part of one of the most ambitious speech-recognition experiments ever launched. On Monday, Google announced that it had added voice search to its iPhone mobile application, allowing people to speak search terms into their phones and view the results on the screen.

Fortunately, Google also has a huge amount of data on how people use search, and it was able to use that to train its algorithms. If the system has trouble interpreting one word in a query, for instance, it can fall back on data about which terms are frequently grouped together.

Google also had a useful set of data correlating speech samples with written words, culled from its free directory service, Goog411. People call the service and say the name of a city and state, and then say the name of a business or category. According to Mike Cohen, a Google research scientist, voice samples from this service were the main source of acoustic data for training the system.

But the data that Google used to build the system pales in comparison to the data that it now has the chance to collect. “The nice thing about this application is that Google will collect all this speech data,” says Jim Glass, a principal research scientist at MIT. “And by getting all this data, they will improve their recognizer even more.” LINK

Which brings us back to the topic of Trade Secrets. The smarter their system becomes the better it will be able to collect and sort business trade secrets, ideas, concepts, methodologies, haggling skills, ‘dirt’, and so on. You’re literally handing them (and the government for that matter) the power to eavesdrop all of your business calls and activities, along with your ‘rolodex’ and any other little notes you store in the phone. Not only is this dangerous for your bottom line its dangerous for us all in creating a monster corporatist quazi-governmental institution wielding the power of “all of the worlds information”. This is so dangerous that we need to be alert to any others positioning themselves likewise.

SEE ALSO:

Advertisements

NZHerald:

…there is a dark side to the success story that’s been spreading across the blogosphere. A complex but riveting Big Brother-type conspiracy theory which links Facebook to the CIA and the US Department of Defence.

The CIA is, though, using a Facebook group to recruit staff for its very sexy sounding National Clandestine Service.

Checking out the job ads
does require a Facebook login, so if you haven’t joined the site – or are worried that CIA spooks will start following you home from work -check them out on the agency’s own site.

The story starts once Facebook founder Mark Zuckerberg had launched, after the dorm room drama that’s led to the current court case.

Facebook’s first round of venture capital funding ($US500,000) came from former Paypal CEO Peter Thiel. Author of anti-multicultural tome ‘The Diversity Myth’, he is also on the board of radical conservative group VanguardPAC.

The second round of funding into Facebook ($US12.7 million) came from venture capital firm Accel Partners. Its manager James Breyer was formerly chairman of the National Venture Capital Association, and served on the board with Gilman Louie, CEO of In-Q-Tel, a venture capital firm established by the Central Intelligence Agency in 1999. One of the company’s key areas of expertise are in “data mining technologies”.

Breyer also served on the board of R&D firm BBN Technologies, which was one of those companies responsible for the rise of the internet.

Dr Anita Jones joined the firm, which included Gilman Louie. She had also served on the In-Q-Tel’s board, and had been director of Defence Research and Engineering for the US Department of Defence.

She was also an adviser to the Secretary of Defence and overseeing the Defence Advanced Research Projects Agency (DARPA), which is responsible for high-tech, high-end development.

It was when a journalist lifted the lid on the DARPA’s
Information Awareness Office
that the public began to show concern at its information mining projects.

Wikipedia’s IAO page says: “the IAO has the stated mission to gather as much information as possible about everyone, in a centralised location, for easy perusal by the United States government, including (though not limited to) internet activity, credit card purchase histories, airline ticket purchases, car rentals, medical records, educational transcripts, driver’s licenses, utility bills, tax returns, and any other available data.”.

Not surprisingly, the backlash from civil libertarians led to a Congressional investigation into DARPA’s activity, the Information Awareness Office lost its funding.

Now the internet conspiracy theorists are citing Facebook as the IAO’s new mask.

Parts of the IAO’s technology round-up included ‘human network analysis and behaviour model building engines’, which Facebook’s massive volume of neatly-targeted data gathering allows for.

Facebook’s own Terms of use state: “by posting Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license to use, copy, perform, display, reformat, translate, excerpt and distribute such information and content and to prepare derivative works of, or incorpoate into other works, such information and content, and to grant and authorise sublicenses of the foregoing.

And in its equally interesting privacy policy: “Facebook may also collect information about you from other sources, such as newspapers, blogs, instant messaging services, and other users of the Facebook service through the operation of the service (eg. photo tags) in order to provide you with more useful information and a more personalised experience. By using Facebook, you are consenting to have your personal data transferred to and processed in the United States.”

Is the CIA really providing the impetus and the funding behind the monster growth of this year’s biggest dot com success story? Maybe only the men with the nice suits and ear pieces can answer that.

http://en.wikipedia.org/wiki/Steganography

Steganography is the practice of hiding messages within media. The picture below is a form of physical steganography, but don’t worry, you don’t have to be both an artist and an expert in exotic ciphers to be able to encode messages. Modern digital steganography tools make this process a snap.

Steganart example. Within this picture, the letter positions of a hidden message are represented by increasing numbers (1 to 20), and a letter value is given by its intersection position in the grid. For instance, the first letter of the hidden message is at the intersection of 1 and 4. So, after a few tries, the first letter of the message seems to be the 14th letter of the alphabet; the last one (number 20) is the 5th letter of the alphabet.

With online photo encrypters such as Mozaiq, you simply upload your image, type in the message, and select a password that the recipient will need to know to be able to decrypt the hidden message.

Here are some more resources:

  • Antiy Labs – Info Stego software is used for embedding files within other files and encrypting them with a 128 bit secure algorithm.
  • BitCrypt – Stego-encryption for text hiding or unseen communication.
  • Concealogram – Steganographic tool for encrypting data in images. Product information, profiles of directors and contact details.
  • CryptoBola – Supports hiding data files in JPEG image files. FAQ, downloadable trial version and user tutorial.
  • Hermetic Stego – Supports hiding data files in one or more BMP image files. Usage instructions, pricing and downloadable evaluation copy. [Windows]
  • Mail++ – Email service for hiding confidential text messages, file attachments, web pages or Windows applications in images. Has a limited-functionality free version.
  • OutGuess – Freeware steganographic tools for hiding and detecting hidden data in PNM and JPEG image formats.
  • Reasonably Adequate Privacy – Steganography technique which uses the tendency of dried vegetable juices to become colored when heated as its base technology.
  • Safe Soft Corporation – CHAOS Universal tool allows the hiding of encrypted data in sound, image, and text files.
  • Steganography and Digital Watermarking – Collection of papers on data hiding and digital watermarking, including countermeasures.
  • Steganography explained. – Digital Steganography and basic Steganalysis explained. Interactive examples, along with a Python based framework to develop your own Steganography tools.
  • Xidie – Offers multiple file steganography and encryption and secure file deletion. Product technical details and ordering information.
  • ACM Queue – Article discussing steganographic techniques and methods for detecting data hidden by them. (December 1, 2004)
  • Securityfocus – Article covering what Steganography is, its applications, tools available and possible approaches to detecting where it is being used. (April 9, 2003)

Government Computer News:

The research organization for U.S. intelligence agencies is looking to fund projects designed to yield revolutionary innovations in intelligence collection.

That organization, the Intelligence Advanced Research Projects Activity (IARPA), has asked industry and academia through a Broad Agency Announcement (BAA)  to propose research that dramatically improves the value of collected data. IARPA said it plans to give out multiple awards for the research and isn’t interested research for topics that are already being ongoing IARPA programs.

The effort is being run by IARPA’s Office of Smart Collection. The office is one of three parts of IARPA that handles that organization’s high-risk, high-payoff research.

In the announcement, IARPA said it’s looking for research “to dramatically improve the value of collected data from all sources.” The organization is interested in:

  • Innovative ways to identifying novel sources of new information
  • New ways to assess collection systems for improved performance
  • Sensor technologies that better the reach, sensitivity and power for collection of broad signal or signature types
  • Tagging, tracking, and location techniques
  • Electrically small antennas
  • Agile architectures that distill useful information at the collection and
  • Innovative ways to ensure the veracity of data collected from multiple sources.

IARPA said it will accept proposals until through September 30, 2011. The resources available for research depend on the quality of the proposals and the availability of funds, IARPA said.

This monster sized parody video has a much larger story: a story so large what else could top it? When machine intelligence surpasses humans and embraces its own power as a ‘living’ god what event in history is a bigger story?

Google’s model from the ground up is in building what they call “the mind of god”, and in this pursuit they’re connected to the government and military to the core.

The Google Boys truly are brilliant, as they’ve designed their system and all of their products to make the system smarter every time all of their users use them. Meaning, every time you use their ‘free’ services, you help bring their “mind of god” scenario closer to reality.

Where to download or stream this video from:
Direct Downloads (High Quality):
Archive Megaupload

Live Streams:
Live Leak Myspace Disclose.tv Mevio sevenload Vimeo

The Google Machine:

Google’s A.I. quest to become God-On-Earth.

Google Founders Artificial Intelligence Quotes Archive.

Under the terms of the 40-year agreement, Google will lease 42.2 acres of unimproved land in NASA Research Park at Ames to construct up to 1.2 million square feet of offices and research and development (R&D) facilities in a campus-style setting.

GOOGLE, the internet giant, is planning a massive online facility that could store copies of users’ hard drives – a move set to spark alarm among civil liberties campaigners.

Google’s top inventor says talking computers are the future.

Google Goggles, an experimental image recognition system for Android 1.6+ devices by which users can submit search queries using snapshots of certain…

Mobile Google Android to condition people to embrace constant GPS tracking

Google seeks to become the “Library of the Future”, by scanning literally every manuscript humans have ever written.

Google wants to be the best in search – no surprise here. To reach that goal, Google wants to have the world’s top AI research laboratory.

Google’s 23andMe DNA Databank is Targeting Children.

Google’s DNA ‘Bio-Piracy’ & Federal DNA Databanks.

We all taught Google’s new advanced speech recognition how to hear.

Google announced at midnight the world’s first Cognitive Autoheuristic Distributed-Intelligence Entity (CADIE), the first evolving intelligent system.

Al Gore is on the Board of Directors of Google.

Google Android wants to be on any device, not just your phone.

‘Don’t Be Evil,’ Meet ‘Spy on Everyone’: How the NSA Deal Could Kill Google

SFGate: Google has lots to do with intelligence agencies.

Google’s massive data centers with their computing power and more than a billion images allow its Goggles image-recognition smartphone app to recognize millions of images…

A new generation of smartphones like Google’s Android G1 now “augments” reality by painting a map over a phone-screen image of the user’s surroundings produced by the phone’s camera.

Google funding Artificial General Intelligence research via Novamente.

Google’s Android Allows Soldiers to Put Drones on Buddy List.

Google’s information appetite is never-ending , and now the search-and-advertising giant wants your help in building a profile page that will show up anytime anyone searches on your name.

Google Fearmongering: ‘More People Will Die From Swine Flu If We Cannot Retain Search Data’.

Kurzweil co-founded Google / NASA’s “Singularity University”.

heir Toolbar, Analytics, Adsense, Gmail, and, of course, Search are all happily gathering petabytes of data about our behavior. Now, Google is employing neuromarketing technology to peer inside our brains.

Obama’s NBIC (nano-bio-info-cogno convergence) Agenda.

Obama appoints Google CEO as economic adviser.

Former Intelligence Agent Says Google In Bed With CIA.

Is Google preparing to launch its own Navy? In its just-published application for a patent on the Water-Based Data Center, Google envisions a world where ‘computing centers are located on a ship or ships.

Google Sued Over Street-View-Mapping Private Homes.

Barcode, Iris Scanners for Google Android.

Google and Elitists.

Google’s quest for the intelligent cloud.

Google Co-Founder: “Perfect Search Requires Human-Level Artificial Intelligence”.

“We’re deploying a new technology that can better understand associations and concepts related to your search”.

Google Founders’ Fighter Jet Will Fly NASA Missions.

Google Co-Founder Wants To Modify Climate.

NEWS UPDATES:

Our Street View cars WERE spying, admits Google

Google Under Multistate Privacy Microscope: How We Got Here

30 states may join probe of Google Wi-Fi snoop

New Google-Verizon DROID commercial depicts human morphing into a Terminator:

New York Times finally covers Google and the Singularity Movement.

Google Invests in Firm That Tries to Predict the Future.

Google Stealthily wipes apps off Android phones

Location-Tracking Services: Why You Should Think Twice

Find The Name Of Any Cell Phone Owner With Detailed Google Map Address Using Free Reverse Cell Phone Number Lookup Services

Frontier Communications: Google Voice infringing patents

New Zealand Refers Google’s Wireless Data-Gathering to Police

Google AdSense Mistakes that Can Kill Your Campaign

Google’s Wi-Fi snoop nabbed passwords and emails

Medvedev to meet Google’s  Schmidt on US trip

Ford steering Google  Maps into its cars

Google keeps mum on new regulations for online mapping in China

GM revving up Google  Maps for OnStar customers

Why Google News Items Are Disappearing From Its News Database?

Google CEO sees one small acquisition a month

Google Spent $1.3 Million on Lobbying, What Are They Buying?

Google’s Washington Influence Is Spreading, Some Say Too Much

Issa wants answers on White House’s Google ties

Google WiSpying Hit Congress; National Security Data Could Have Been Gathered

Google’s influence grows in the W.H.

Twitter hires Obama administration’s Katie Stanton

Google Buys U.K. Start-Up Plink, a Shazam for Art

Google Goggles

Google using search engine to muscle into Internet businesses, study finds

Financial Times examines Google’s ’secret formula’

Expedia is worried about Google/ITA deal

Google gets a slap on the wrist for violating Australian privacy law

Double Trouble for Google

Google exec tries hard sell on cloud computing

Google finds itself on the defensive in China

Top trustbuster says DOJ watching search industry

Will Google’s Newspass save serious journalism?

House Oversight chair questions federal cloud strategy

Standing up to Google’s heavy-handed pressure

Where you Point Your Mouse May Influence Google Search Rankings, Advertisement Placement, and Oneboxes

Don’t Look Now, but Google’s Following You

Google commands largest audience in APAC: Comscore

Google Could Have Collected WiFi Data From Members Of Congress

Google’s Eric Schmidt: You can trust us with your data

Facial Recognition Software, for Everyone

Why Google Employees Quit

Obama & Google (a love story)

Google to Pay Homosexual Staff More than Heterosexual Employees

Tech Titans’ Ties to Washington Grow Closer — and More Complicated

More on Google lobbying and influence

Google Deliberately Stole Data, Says Australia

Google Bans DVD Critical Of Obama Administration

Apple and Google backed Obama to the hilt

Google registered a political action committee.

Someone told me about this story today, and sure enough it’s real. This is how it happens: they put cameras up in intersections and everyone gets used to it. Then they put them in crime ridden areas, and people get used to that. Next thing you know cameras are everywhere, including hundreds of hidden cameras in every neighborhood in the US, like in the UK or as being proposed by “HoodEyes.com”.

This spring, deputies will begin using 20 cameras mounted on utility poles to zoom in on the University Area’s trouble spots.

The cameras can provide clear images of license plates three blocks away. They can show whether a quarter on the sidewalk landed heads or tails. And they can see into darkness using infrared technology.

Even when not monitored by humans, they will record around the clock, with the video stored for review days or weeks later.

“Who wouldn’t want a cop standing on your corner?” said Maj. J.R. Burton, the commander for the sheriff’s district covering the University Area. “That’s essentially what you’ve got now with the video camera on that corner.”

A $1.3 million federal grant paid to install the cameras, a first for the Sheriff’s Office, in an area bounded by N 23rd Street and Fowler, Bearss and Nebraska avenues. www.tampabay.com…

While trying to find this story I stumbled upon this “HoodEyes” outfit:

The neighborhoods of Tampa have to be protected and it’s always important to have eyes all over the neighborhood. Notify your neighborhood association about having these eyes installed throughout your Tampa neighborhood. With one life to live, it’s important to protect yourself as well as your neighbors.

Hello Tampa! It just takes one time for someone to break into a home, destroy the home, and commit murder. Once this is complete, it’s done, no going back and saying, Gee! I wish I had protected my home, myself, and my family. In Tampa, neighborhoods have to work together and do what it takes to protect their home. An Tampa home is the same as any home in any neighborhood across the Country and it needs to be protected. Come on Tampa, it’s good to have a home security system, but is this the final answer? No! We need to protect our Tampa streets and Tampa neighborhoods by installing our Hood Eyes around the whole neighborhood. These eyes will give everyone the opportunity to feel better and safe.

Here’s an example Tampa! Let’s say there’s a bunch of teenagers in the street fighting and it’s getting worse by the minute. Well, first thing you do is contact your local Tampa police department. Well, if it’s not a murder or a cop hurt, then there’s no telling how long they’ll take to get there. With hood eyes installed all around the neighborhood, this will be monitored by a local representative and the neighborhood hoodeye security will get there within minutes. Not only is the best way to do it but everything will be on camera! When the real police get there, all problems have been solved.

The people of Tampa asks, How is this paid for? Well, with neighborhood association fees, a couple of dollars here and there will pay for what’s needed to make the neighborhoods of Tampa safe. We need these camera devices and security patrol in every neighborhood across the Country. If a murder or crime is committed, then it’s too late! You cannot do anything about the situation if it’s already occurred. These hood eyes will prevent the crime or murder from ever happening. We need to stand up to the associations and demand that security is needed in every neighborhood, no matter how fancy, how rich, how poor, or how run down it is! Wake up Tampa and have the hood eyes in every neighborhood!
tampa.hoodeyes.com…

Whether it’s nighttime or daytime, crimes will always be committed. Security systems do work, to a certain extent! With our camera eyes placed in hundreds of locations, we’re always watching your neighborhood. If a crime is being committed, we will no about it, within seconds.

With contracts with neighborhood associations across the Country, our system allows everyone the convenience of having this 24 hour a day security without any hassles and just costing dollars. Any suspicious activity within a neighborhood will be reported within seconds as well as recorded for future evidence. We have become the top neighborhood watch across the Nation.
www.hoodeyes.com…

When you browse through their site you see every state and city listed, where they’re trying to get this in place.

Hoodeyes.com WHOIS information:

Domain name: hoodeyes.com
Registrant Contact:  EE Nation
Patricia Maggio ()
11511 Katy Freeway, ste 383
Houston, TEXAS 77079
US
whois.domaintools.com…

“EE Nation” is some inconspicuous ‘spam’ looking site that is linked to a ton of other sites:
www.eenation.com…

But another interesting one is “ReaperEyes.com:

Whether it’s in a nightclub, restaurant, or casino, Reaper eyes will be watching you! With partners across the Country, we’re able to put cameras in spots untouchable and not noticed. These cameras will have a live stream, allowing dispatchers to notice something out of the ordinary. If someone looks intoxicated, the police will be notified and they will be going to jail! www.reapereyes.com…

Hmm. Perhaps the HoodEyes thing is a dead end, but the fact is Homeland Security is now creeping into residential neighborhoods via these police cameras and it won’t stop there with the public so limber.

Now in case you’re saying to yourself  ‘so what I don’t do anything wrong let them watch me’, hold your breath.

You say good, but how much have you thought it through? Where should it end? Since a few blocks of a metropolitan area are crime ridden then that justifies when in a couple years they’ll have these creeping in everywhere? The criminals will just move over to areas with no cameras.

You don’t mind one of these outside your house able to look into your windows and see what’s going on even in the dark, being watched by both the local police and the federal Homeland Security?? You don’t mind having cameras track you from the time you leave your driveway until you get to wherever it is you’re going, including unflattering things / places?

How far is too far? Apparently you don’t mind being monitored and tracked every moment you spend outside of your home… how about listened to? Should they also listen to every possible thing you say? What if you want to talk dirty to your lady/man? You don’t mind perverts listening in on it? And never mind hackers.

And what about tyrannical laws? In a free society, where we’re told we’re free but we’re not, people shouldn’t be able to use their own judgment and risks about laws they don’t agree with as long as they aren’t hurting other people?

These are our HOMES we’re talking about here. This isn’t the sidewalk in downtown anymore. This isn’t the intersection. People should have the dignity to do unflattering things with total privacy.

What about inside your home? Have cameras and microphones in there listening and watching that? Which rooms are sacred? What is to remain sacred, anymore? And is it worth it? How many times were YOU mugged before and after the cameras? Out of your entire population, what percentage died per year from terrorism?

You don’t mind police and feds being able to look into your windows in the dark and see you or your family members nude??? Oh, and in case you try to argue that you don’t mind black & white cameras seeing you naked through a dark window, guess again:

Color Night Vision

The Contrast Enhanced (Retrofit) goggle configuration (CANVS Patent-Pending) represents a unique capability. It allows immediate insertion of the core CANVS Color Night Vision Goggle technology into all areas of operation currently utilizing binocular night vision goggles. This technology can be retrofitted into all existing binocular systems, including but not limited to: AN/AVS-6 and 9, AN/PVS-5A, B, and C, M908, M909, M915A, AN/PVS-15, AN/AVS-502 low profile goggle, Wide Field of View, and Panoramic Goggle configurations. www.canvs.com…

Hey unless voyeurism is your thing that’s cool. Everybody wants to be a celebrity these days. Watch me! Watch me Uncle Sam!

Raw Story

US House Rep. Ron Paul says the CIA has has in effect carried out a “coup” against the US government, and the intelligence agency needs to be “taken out.”

Speaking to an audience of like-minded libertarians at a Campaign for Liberty regional conference in Atlanta this past weekend, the Texas Republican said:

There’s been a coup, have you heard? It’s the CIA coup. The CIA runs everything, they run the military. They’re the ones who are over there lobbing missiles and bombs on countries. … And of course the CIA is every bit as secretive as the Federal Reserve. … And yet think of the harm they have done since they were established [after] World War II. They are a government unto themselves. They’re in businesses, in drug businesses, they take out dictators … We need to take out the CIA.

FULL STORY