portland independent media center  
images audio video
newswire article reposts united states

human & civil rights

BIG brother is watching you !!!!!

Welcome to America, 2005, where the actions of more than 150 million citizens are monitored 24/7 by the TIA, the Terrorist Information Awareness (originally called Total Information Awareness) program of DARPA, DHS and the Department of Justice..."We have a police state far beyond anything George Orwell imagined in his book 1984," says privacy expert Susan Morrissey. "The everyday lives of virtually every American are under scrutiny 24-hours-a-day by the government."
1) How Big Brother Is Watching, Listening and Misusing Information About You

You're on your way to work in the morning and place a call on your wireless phone. As your call is relayed by the wireless tower, it is also relayed by another series of towers to a microwave antenna on top of Mount Weather between Leesburg and Winchester, Virginia and then beamed to another antenna on top of an office building in Arlington where it is recorded - Projects Agency already has on record as part of your permanent file.

A series of sophisticated computer programs listens to your phone conversation and looks for "keywords" that suggest suspicious activity. If it picks up those words, an investigative file is opened and sent to the Department of Homeland Security.

Congratulations. Big Brother has just identified you as a potential threat to the security of the United States because you might have used words like "take out" (as in taking someone out when you were in fact talking about ordering takeout for lunch) or "D-Day" (as in deadline for some nefarious activity when you were talking about going to the new World War II Memorial to recognize the 60th
anniversary of D-Day).

If you are lucky, an investigator at DHS will look at the entire conversation in context and delete the file. Or he or she may keep the file open even if they realize the use of words was innocent. Or they may decide you are, indeed, a threat and set up more investigation, including a wiretap
on your home and office phones, around-the-clock surveillance and much closer looks at your life.

Welcome to America, 2005, where the actions of more than 150 million citizens are monitored 24/7 by the TIA, the Terrorist Information Awareness (originally called Total Information Awareness) program of DARPA, DHS and the Department of Justice.

Although Congress cut off funding for TIA last year, the Bush Administration ordered the program moved into the Pentagon's "black bag" budget, which is neither authorized nor reviewed by the Hill. DARPA also increased the use of private contractors to get around privacy laws that would restrict activities by federal employees.

Six months of interviews with security consultants, former DARPA employees, privacy experts and contractors who worked on the TIA facility at 3701 Fairfax Drive in Arlington reveal a massive snooping operation that is capable of gathering - in real time - vast amounts of information on the day to day activities of ordinary Americans.

Going on a trip? TIA knows where you are going because your train, plane or hotel reservations are forwarded automatically to the DARPA computers. Driving? Every time you use a credit card to purchase gas, a record of that transaction is sent to TIA which can track your movements across town or across the country.

Use a computerized transmitter to pay tolls? TIA is notified every time that transmitter passes through a tollbooth. Likewise, that lunch you paid for with your VISA becomes part of your permanent file, along with your credit report, medical records, driving record and even your TV viewing habits.

Subscribers to the DirecTV satellite TV service should know - but probably don't - that every pay-per-view movie they order is reported to TIA as is any program they record using a TIVO recording system. If they order an adult film from any of DirecTV's three SpiceTV channels, that information goes to TIA and is, as a matter of policy, forwarded to the Department of Justice's special task force on pornography.

"We have a police state far beyond anything George Orwell imagined in his book 1984," says privacy expert Susan Morrissey. "The everyday lives of virtually every American are under scrutiny 24-hours-a-day by the government."

Paul Hawken, owner of the data information mining company Groxis, agrees, saying the government is spending more time watching ordinary Americans than chasing terrorists and the bad news is that they aren't very good at it.

"It's the Three Stooges go to data mining school," Hawken says. "Even worse, DARPA is depending on second-rate companies to provide them with the technology, which only increases the chances for errors."

One such company is Torch Concepts. DARPA provided the company with flight information on five million passengers who flew Jet Blue Airlines in 2002 and 2003. Torch then matched that information with social security numbers, credit and other personal information in the TIA databases to build a prototype passenger profiling system.

Jet Blue executives were livid when they learned how their passenger information, which they must provide the government under the USA Patriot Act, was used and when it was presented at a technology conference with the title: Homeland Security - Airline Passenger Risk Assessment.

Privacy Expert Bill Scannell didn't buy Jet Blue's anger.

"JetBlue has assaulted the privacy of 5 million of its customers," said Scannell. "Anyone who flew should be aware and very scared that there is a dossier on them."

But information from TIA will be used the DHS as a major part of the proposed CAPSII airline passenger monitoring system. That system, when fully in place, will determine whether or not any American is allowed to get on an airplane for a flight.

JetBlue requested the report be destroyed and the passenger data be purged from the TIA computers but TIA refuses to disclose the status of either the report or the data.

Although exact statistics are classified, security experts say the U.S. Government has paid out millions of dollars in out-of-court settlements to Americans who have been wrongly accused, illegally detained or harassed because of mistakes made by TIA. Those who accept settlements also have to sign a non-disclosure agreement and won't discuss their cases.

Hawken refused to do business with DARPA, saying TIA was both unethical and illegal.

"We got a lot of e-mails from companies - even conservative ones - saying, 'Thank you. Finally someone won't do something for money,'" he adds.

Those who refuse to work with TIA include specialists from the super-secret National Security Agency in Fort Meade,MD. TIA uses NSA's technology to listen in on wireless phone calls as well as the agency's list of key words and phrases to identify potential terrorist activity.

"I know NSA employees who have quit rather than cooperate with DARPA," Hawken says. "NSA's mandate is to track the activities of foreign enemies of this nation, not Americans."

==============================================================

WHAT SECRETS DOES YOUR COMPUTER KNOW!

Deleting "Internet Cache and History" will NOT protect you because any of the Web Pages, Pictures, Movies,Videos, Sounds, E-mail, Chat Logs and Everything Else you see or do could easily be recovered to Haunt you forever!

Evidence Eliminator is a solution to this problem. It analyzes and protects your whole hard drive and defeats all known Forensic Analysis Software.

Download your copy now - 30 day risk free trial!

 http://www.myprivacyclub.com/eedownload.htm

==============================================================

2) Snapshots.

----------

Legal Implications of Using RFID Highlighted

The U.S. Department of Homeland Security (DHS) will use RFID chips on a trial basis to track the arrival and return of visitors from abroad. The testing phase, which will begin this spring and is expected to last one year, will occur at selected points of entry across the U.S., and it will complement the current U.S.-VISIT scheme.

The U.S.-VISIT scheme, which entails fingerprinting visitors, has encountered criticism, and to date more than 400 people have been refused entry or arrested as a result of this scheme.

Although the exact way that the RFID chips will be implemented is not yet known, they will be used to track pedestrians and vehicles entering the U.S. This move by the DHS is yet another example of the growing use of RFID technology.

 http://www.technewsworld.com/story/40203.html


----------

Drifting from freedom

Do you feel more or less free today than you did 10 years ago? If you happen to be a property developer, sit on the board of a public corporation, often travel by air, like to spend your own money supporting political candidates and causes you believe in, or are outspoken in your Christian beliefs, you almost certainly answered the above question, "Less free."

Our Founding Fathers and other political thinkers recognized that free peoples most often lose their freedoms not in one sudden blow, but by the endless erosion of liberties they once had. As a student in biology, you may have learned that if a frog is put in a pot of water slowly brought to a boil, the frog will not be aware of what is happening until it is too late. There is increasing evidence Americans, like the frog, are having their liberties slowly boiled away without realizing it.

 http://washingtontimes.com/commentary/20050129-095132-5873r.htm

----------

Department of Terrifying the Homeland?

Michael Chertoff has his work cut out for him. President Bush's nominee to head the Department of Homeland Security inherits an unwieldy bureaucracy of 22 agencies and 180,000 people with incompatible computer systems, unclear authority, and low morale. But the biggest challenge Chertoff faces is the Department's strategy: it fails to acknowledge that the war on terrorism is - or at least should be -- a war against fear.

Terrorism takes its name not from violence, but from the emotion it provokes. By telling all Americans that they are possible victims of terrorism, the Department of Homeland Security plays into terrorists hands. If we are all afraid of terrorism, we are all terrorists' victims.

 http://www.techcentralstation.com/020105D.html

----------

Abandoning Liberty, Gaining Insecurity

Should Americans have to give up the Bill of Rights in order to be "safe" from terrorists?
Actually, it doesn't matter what Americans think. The trade has already been made - and without any input from the people. The "democracy" that America is exporting is in fact a Homeland Security State with more surveillance powers than Saddam Hussein.

Americans no longer have any privacy from government. You
may not be able to find out about your daughter?s abortion
or your son?s college grades, but neither you nor your children have any secret whatsoever from your government.
Banks, airlines, libraries, credit card companies, medical doctors and health care organizations, employers, Internet providers, any and everyone must turn over your private information at government demand.

 http://www.lewrockwell.com/roberts/roberts93.html

----------

Privacy Debate Misses the Point

With the debate over renewal of the Patriot Act and talk of turning driver's licenses into national ID cards, the privacy issues long familiar to the tech community are headed for political center stage.

"There is a lot of movement'' on privacy, says Ari Schwartz, associate director of the Center for Democracy and Technology in Washington, D.C. "It will be breaking out in the next three months."

In some respects, it feels like nothing has changed in the five years since Sun Microsystems CEO Scott McNealy made headlines when he told an audience to "get over" the fact that they had no privacy online. Privacy advocates were outraged. Tech folks shrugged.

As head of a company whose business is devoted to increasing the power of computer networks, McNealy was saying what he knew to be true: Average Americans have given up a great deal of privacy in exchange for some conveniences like credit cards, ATMs and frequent flyer miles.

 http://www.eweek.com/article2/0,1759,1759091,00.asp


----------

Is the U.S. government spying on its citizens' e-mail and web surfing habits?

The Electronic Frontier Foundation (EFF), a group that defends civil liberties on the Internet, believes the answer is probably "yes". Earlier this month, the San Francisco-based watchdog filed a Freedom of Information Act request with the Federal Bureau of Investigation and other U.S. Department of Justice offices.

It is seeking documents that would shed light on whether the government has been using the USA Patriot Act, which curtails some civil liberties as part of the "war on terror", to spy on Internet users and collect secret information about their on-line activity without a searchwarrant.

 http://www.americasnetwork.com/americasnetwork/article/articleDetail.jsp...

----------

==============================================================

LEARN HOW TO ANONYMIZE ALL YOUR INTERNET ACTIVITIES

Most online privacy tools are useless against serious privacy threats. Offshore privacy insiders have known this for years, and have been using their own powerful tools to protect themselves.

Now you can benefit directly from this technology!

 http://www.myprivacyclub.com/tunnelreport.html

==============================================================

3) Favourite Quotations:

"Freedom is not merely the opportunity to do as one pleases; neither is it merely the opportunity to choose between set alternatives. Freedom is, first of all, the chance to formulate the available choices, to argue over them -- and then, the opportunity to choose."

-- C. Wright Mills

==============================================================

4) MPC MEMBERSHIP UPDATE: All New Members joining
the MPC now receive the Stuart Goldsmith Inner Circle
Freedom and Wealth building course without cost! This is a
$279.50 Value.
To learn more about the Inner Circle Course
visit:

 http://www.stuart-goldsmith-inner-circle.com

To join My Privacy Club visit
 http://www.myprivacyclub.com

==============================================================

Please help spread the message of freedom and FORWARD THIS NEWSLETTER to your friends and
associates!

add a comment on this article

Mayberry, RFID 08.Feb.2005 14:41

twospiritwarrior

SafeTzone Corporation To Install Its SAMSys RFID Readers
At Amusement Parks.
These RFID tags will be used as Family Locator Systems.

Cliff Horwitz, CEO of SAMys Technologies says that
the RFID program will take people into places that
they could not imagine.
"SafeTzone's RFID system shows the different kinds
of applications", says Horwitz, "other than
tracking products, which can be enabled by this
technology."

SAMSys Technologies Inc., of Toronto announced
today that they have made an agreement to install
radio frequency identification (RFID) tags, which
will be used with the SafeTzone Technologies'
family locator system.
These systems have been installed at different
locations -- like Steamboat Ski and Resort in
Colorado; Wannado City in Florida; Paramount's
Great America in California; and Dollywood's
Splash Country in Tennessee.

The SAMSys scanners will work in with the special
RFID-bracelets, which will be used to identify
family members at different locations around the
park.
The RFID tags can also be used for retail trans-
actions, such as food, drinks, and other goods.

The SafeTzone Corporation has been using the
SAMSys scanners for about 18 months, and has
recently ordered another 150 units.
SafeTzone now has a customized version of its
MP9112, 134 KHz model which will be used to
accomodate its RFID needs.
The company said that it had chosen the SAMSys
products because of their reliability, perfor-
mance, which includes instantaneous read outs
which is necessary for smooth user interaction.

SAMSys has incorporated an external antenna into
the scanner which will increase the read range up
to 8 inches, which will ensure easy scanning of
children and adults.
The scanners normally read the RFID tags at one
to three inches.
SAMys has also added an snap-in device for the
power supply, which will eliminate the problem
of disconnections.
The SafeTzone technology will monitor the locations
of all family members on a continuous basis through
the waterproof transmitter in the SafeTzone wristband.

"Our RFID tags and Scanners", says Martin Crowley,
the head technology officer, are problem-free and
can even be used by children." "These devices
will make it easier for our guests to use our
different services", said Crowley.

SafeTzone's devices will enable families,, schools,
church's, etc., to account for all members at all
times, to find members who have become lost or
separated, and groups can split up, knowing that
they will be able to find each other without any
trouble.
The SAMys system can be used for personal purchases,
which will eliminate the need for people to carry
money, and the day's spending for the entire group
will be recorded by the RFID tag.

The SAMSys' 134 KHz MP9112 scanners complements the
Texas Instruments' TIRIS RFID tags, also being used
by SafeTzone, as well as the Philips Hitag 1 tags.
SafeTzone uses the complete reader package, which is
also available as a board-level model that can be
integrated into other equipment.

SAMSys Technologies Inc., which was founded in 1995,
is a world-leading producer and provider of radio
frequency identification (RFID) hardware solutions
and RFID integration consulting services which are
designed to evaluate and recommend optimal RFID
solutions to enhance business operations.
SAMSys also offers a wide range of products,
which will make installation easier, and guarantee
performance of the overall RFID hardware infra-
structure.
SAMSys is a public company, and their shares are
open for trading on the TSX Exchange under the
symbol "SMY", and the company has a total of 47.6
million outstanding shares.

For more info:
 http://www.samsys.com
 http://www.safetzone.com
 http://www.investorfile.com

A Mayberry, RFID Update 08.Feb.2005 16:44

twospiritwarrior

Below is the original article from
the pro-RFID Gazette.

Zombies in the night,
exchanging blank glances..............
********************************

RFID Report -
The Future Is Here
A Beginner's Guide To RFID
The RFID Gazette
2-7-5

Radio frequency identification technology (RFID) is beginning to revolutionize the way business is done. Already, the U.S. Department of Defense and Wal-Mart are requiring their top suppliers to have RFID technology implemented in their supply chains by January 1, 2005. As more manufacturers of RFID tags, readers and software solutions enter the market, the price of implementing the technology will continue to decline.

The technology, first invented by Harry Stockman with the publishing of his 1948 report "Communication by Means of Reflected Power," has only in the last few years become viable. As time passes, however, nearly every Fortune 500 company will join the DoD and Wal-Mart in employing the technology, making it an essential factor in almost any business.

The key feature of the technology is the ability for an RFID-tagged object to be tracked instantly from anywhere in the world, provided that a reader is in range. The main application for this today is tracking products along a supply chain. Everyone in the RFID-enabled supply chain, from the manufacturers at the factory to the inventory trackers at the retail location, has the ability to instantly call up the location, condition, and supply of a particular product. Industry professionals expect the RFID tag to eventually replace the barcode as the identification system of choice. And there are several reasons why this should eventually happen.

First, however, it is important to understand how the technology works. There are two types of RFID tags. An active tag uses its own battery power to contact the reader. It works over a greater distance than passive tags, but its larger size is its main drawback. On the other hand, a passive tag does not require a battery. Rather, a passive tag derives its power from the electromagnetic field created by the signal from the RFID reader. This generates enough power for the tag to respond to the reader with its information. While the range is smaller than active tags, having no need for a battery makes the passive tagís life virtually unlimited and its size potentially minute.

In contrast to the barcode, RFID tags can be read from a larger distance, up to nine meters with some readers. Also, unlike optical barcode scanners, the RFID chip can be read from a reader not in its line of sight. For instance, cargo within a truck does not need to be unloaded to be scanned by an RFID reader, as the radio waves can penetrate the walls of the truck. The truck example brings up another intriguing feature of the technology. While a barcode needs to scan products one at a time, an RFID reader can read hundreds of chips virtually instantaneously, speeding up the loading and delivery processes.

Furthermore, some RFID tags contain other sensors that can transmit valuable data to managers. For example, a manager shipping a refrigerated product may like to know if the temperature increases too much along a supply chain route. With thermometer readings being transmitted, this is possible.

Other features of RFID technology have caught the attention of privacy advocates. It has been acknowledged that RFID technology can be used for marketing purposes or even, in a Brave New World scenario, government tracking of its citizens. For instance, it is possible to ubiquitously embed the chip within a product, for instance a pair of jeans or a set of automobile tires. What is most frightening, however, is the ability to implant an RFID chip under the human skin.

If the tag is able to remain active after purchase of a product, this could potentially enable marketers with the ability to track information about the product after it leaves the store. For human tracking, sub-dermal RFID chips are already being offered. Of course, the human implant is more than just a tracking device. Credit card and other personal information can be stored on the chip and transmitted to a reader to pay for goods in a supermarket or gain access to personnel-restricted high security areas.

More practical uses of RFID tags have emerged as well:

-- In the pharmaceutical industry, RFID tags on drug bottles are being used as anti-counterfeiting devices.

-- Pet owners have begun implanting their cats and dogs with RFID chips to locate them should they become lost.

-- In libraries, books are being tagged for self-automated checkout, freeing up librarians to perform other tasks. This also allows a librarian to easily locate a book misplaced on the wrong shelf.

-- The USDA is pushing to give every cow in the United States its own unique identification number, making it easier to track diseases, such as mad cow disease, back to the originating farm.

Due to the lack of industry standards regarding the use of personal information that could be encoded on the chips, many privacy advocates have called on companies to state their intended use of the technology. Recently, the Privacy Rights Clearinghouse called on the Federal Trade Commission to regulate the use of RFID. As of yet, however, no federal agency has come forth to regulate the usage of the technology.

Technical standardization will bring the cost of RFID down drastically. EPCglobal Inc., which has taken over for the MIT Auto ID Center, is the non-profit organization that is working to standardize electronic product codes and RFID technology.

The EPCglobal Network uses RFID to enable true visibility of objects in the supply chain. The network has five fundamental elements:

1. The Electronic Product Code (EPC) is a unique number that identifies an item in the supply chain, whether that be an individual product or a case, or pallet, of many products being shipped. 2. Each silicon chip of each RFID tag is encoded with a unique EPC that identifies the product. The silicon chip is wired to an antenna, and, using radio frequency identification technology, each tag communicates to an RFID reader its EPC. 3. The Object Name Service (ONS) collects the EPC that is passed on from the reader. The ONS resides on a computer or local application system. It tells the computer systems where to locate information on the network about the item whose EPC it has just encountered. This information will typically reside on the Internet, making it readily available on a worldwide level. 4. Physical Markup Language (PML) is an XML-based language that is used to define data on objects. 5. Savant is the middleware technology that coordinates the movement of information over the computer systems.

Related links:
RFID Chips For Politicians?
 http://www.rfidjournal.com/article/articlereview/1392/1/1

GPS Tracking For Children
 http://wherifywireless.com/prod_watches.htm

National ID II: The Drive Continues
 http://infowars.net/Pages/Feb05/070205ID.html