BIG brother is watching you !!!!!
Welcome to America, 2005, where the actions of more than 150 million citizens are monitored 24/7 by the TIA, the Terrorist Information Awareness (originally called Total Information Awareness) program of DARPA, DHS and the Department of Justice..."We have a police state far beyond anything George Orwell imagined in his book 1984," says privacy expert Susan Morrissey. "The everyday lives of virtually every American are under scrutiny 24-hours-a-day by the government."
1) How Big Brother Is Watching, Listening and Misusing Information About You
You're on your way to work in the morning and place a call on your wireless phone. As your call is relayed by the wireless tower, it is also relayed by another series of towers to a microwave antenna on top of Mount Weather between Leesburg and Winchester, Virginia and then beamed to another antenna on top of an office building in Arlington where it is recorded - Projects Agency already has on record as part of your permanent file.
A series of sophisticated computer programs listens to your phone conversation and looks for "keywords" that suggest suspicious activity. If it picks up those words, an investigative file is opened and sent to the Department of Homeland Security.
Congratulations. Big Brother has just identified you as a potential threat to the security of the United States because you might have used words like "take out" (as in taking someone out when you were in fact talking about ordering takeout for lunch) or "D-Day" (as in deadline for some nefarious activity when you were talking about going to the new World War II Memorial to recognize the 60th
anniversary of D-Day).
If you are lucky, an investigator at DHS will look at the entire conversation in context and delete the file. Or he or she may keep the file open even if they realize the use of words was innocent. Or they may decide you are, indeed, a threat and set up more investigation, including a wiretap
on your home and office phones, around-the-clock surveillance and much closer looks at your life.
Welcome to America, 2005, where the actions of more than 150 million citizens are monitored 24/7 by the TIA, the Terrorist Information Awareness (originally called Total Information Awareness) program of DARPA, DHS and the Department of Justice.
Although Congress cut off funding for TIA last year, the Bush Administration ordered the program moved into the Pentagon's "black bag" budget, which is neither authorized nor reviewed by the Hill. DARPA also increased the use of private contractors to get around privacy laws that would restrict activities by federal employees.
Six months of interviews with security consultants, former DARPA employees, privacy experts and contractors who worked on the TIA facility at 3701 Fairfax Drive in Arlington reveal a massive snooping operation that is capable of gathering - in real time - vast amounts of information on the day to day activities of ordinary Americans.
Going on a trip? TIA knows where you are going because your train, plane or hotel reservations are forwarded automatically to the DARPA computers. Driving? Every time you use a credit card to purchase gas, a record of that transaction is sent to TIA which can track your movements across town or across the country.
Use a computerized transmitter to pay tolls? TIA is notified every time that transmitter passes through a tollbooth. Likewise, that lunch you paid for with your VISA becomes part of your permanent file, along with your credit report, medical records, driving record and even your TV viewing habits.
Subscribers to the DirecTV satellite TV service should know - but probably don't - that every pay-per-view movie they order is reported to TIA as is any program they record using a TIVO recording system. If they order an adult film from any of DirecTV's three SpiceTV channels, that information goes to TIA and is, as a matter of policy, forwarded to the Department of Justice's special task force on pornography.
"We have a police state far beyond anything George Orwell imagined in his book 1984," says privacy expert Susan Morrissey. "The everyday lives of virtually every American are under scrutiny 24-hours-a-day by the government."
Paul Hawken, owner of the data information mining company Groxis, agrees, saying the government is spending more time watching ordinary Americans than chasing terrorists and the bad news is that they aren't very good at it.
"It's the Three Stooges go to data mining school," Hawken says. "Even worse, DARPA is depending on second-rate companies to provide them with the technology, which only increases the chances for errors."
One such company is Torch Concepts. DARPA provided the company with flight information on five million passengers who flew Jet Blue Airlines in 2002 and 2003. Torch then matched that information with social security numbers, credit and other personal information in the TIA databases to build a prototype passenger profiling system.
Jet Blue executives were livid when they learned how their passenger information, which they must provide the government under the USA Patriot Act, was used and when it was presented at a technology conference with the title: Homeland Security - Airline Passenger Risk Assessment.
Privacy Expert Bill Scannell didn't buy Jet Blue's anger.
"JetBlue has assaulted the privacy of 5 million of its customers," said Scannell. "Anyone who flew should be aware and very scared that there is a dossier on them."
But information from TIA will be used the DHS as a major part of the proposed CAPSII airline passenger monitoring system. That system, when fully in place, will determine whether or not any American is allowed to get on an airplane for a flight.
JetBlue requested the report be destroyed and the passenger data be purged from the TIA computers but TIA refuses to disclose the status of either the report or the data.
Although exact statistics are classified, security experts say the U.S. Government has paid out millions of dollars in out-of-court settlements to Americans who have been wrongly accused, illegally detained or harassed because of mistakes made by TIA. Those who accept settlements also have to sign a non-disclosure agreement and won't discuss their cases.
Hawken refused to do business with DARPA, saying TIA was both unethical and illegal.
"We got a lot of e-mails from companies - even conservative ones - saying, 'Thank you. Finally someone won't do something for money,'" he adds.
Those who refuse to work with TIA include specialists from the super-secret National Security Agency in Fort Meade,MD. TIA uses NSA's technology to listen in on wireless phone calls as well as the agency's list of key words and phrases to identify potential terrorist activity.
"I know NSA employees who have quit rather than cooperate with DARPA," Hawken says. "NSA's mandate is to track the activities of foreign enemies of this nation, not Americans."
WHAT SECRETS DOES YOUR COMPUTER KNOW!
Deleting "Internet Cache and History" will NOT protect you because any of the Web Pages, Pictures, Movies,Videos, Sounds, E-mail, Chat Logs and Everything Else you see or do could easily be recovered to Haunt you forever!
Evidence Eliminator is a solution to this problem. It analyzes and protects your whole hard drive and defeats all known Forensic Analysis Software.
Download your copy now - 30 day risk free trial!
Legal Implications of Using RFID Highlighted
The U.S. Department of Homeland Security (DHS) will use RFID chips on a trial basis to track the arrival and return of visitors from abroad. The testing phase, which will begin this spring and is expected to last one year, will occur at selected points of entry across the U.S., and it will complement the current U.S.-VISIT scheme.
The U.S.-VISIT scheme, which entails fingerprinting visitors, has encountered criticism, and to date more than 400 people have been refused entry or arrested as a result of this scheme.
Although the exact way that the RFID chips will be implemented is not yet known, they will be used to track pedestrians and vehicles entering the U.S. This move by the DHS is yet another example of the growing use of RFID technology.
Drifting from freedom
Do you feel more or less free today than you did 10 years ago? If you happen to be a property developer, sit on the board of a public corporation, often travel by air, like to spend your own money supporting political candidates and causes you believe in, or are outspoken in your Christian beliefs, you almost certainly answered the above question, "Less free."
Our Founding Fathers and other political thinkers recognized that free peoples most often lose their freedoms not in one sudden blow, but by the endless erosion of liberties they once had. As a student in biology, you may have learned that if a frog is put in a pot of water slowly brought to a boil, the frog will not be aware of what is happening until it is too late. There is increasing evidence Americans, like the frog, are having their liberties slowly boiled away without realizing it.
Department of Terrifying the Homeland?
Michael Chertoff has his work cut out for him. President Bush's nominee to head the Department of Homeland Security inherits an unwieldy bureaucracy of 22 agencies and 180,000 people with incompatible computer systems, unclear authority, and low morale. But the biggest challenge Chertoff faces is the Department's strategy: it fails to acknowledge that the war on terrorism is - or at least should be -- a war against fear.
Terrorism takes its name not from violence, but from the emotion it provokes. By telling all Americans that they are possible victims of terrorism, the Department of Homeland Security plays into terrorists hands. If we are all afraid of terrorism, we are all terrorists' victims.
Abandoning Liberty, Gaining Insecurity
Should Americans have to give up the Bill of Rights in order to be "safe" from terrorists?
Actually, it doesn't matter what Americans think. The trade has already been made - and without any input from the people. The "democracy" that America is exporting is in fact a Homeland Security State with more surveillance powers than Saddam Hussein.
Americans no longer have any privacy from government. You
may not be able to find out about your daughter?s abortion
or your son?s college grades, but neither you nor your children have any secret whatsoever from your government.
Banks, airlines, libraries, credit card companies, medical doctors and health care organizations, employers, Internet providers, any and everyone must turn over your private information at government demand.
Privacy Debate Misses the Point
With the debate over renewal of the Patriot Act and talk of turning driver's licenses into national ID cards, the privacy issues long familiar to the tech community are headed for political center stage.
"There is a lot of movement'' on privacy, says Ari Schwartz, associate director of the Center for Democracy and Technology in Washington, D.C. "It will be breaking out in the next three months."
In some respects, it feels like nothing has changed in the five years since Sun Microsystems CEO Scott McNealy made headlines when he told an audience to "get over" the fact that they had no privacy online. Privacy advocates were outraged. Tech folks shrugged.
As head of a company whose business is devoted to increasing the power of computer networks, McNealy was saying what he knew to be true: Average Americans have given up a great deal of privacy in exchange for some conveniences like credit cards, ATMs and frequent flyer miles.
Is the U.S. government spying on its citizens' e-mail and web surfing habits?
The Electronic Frontier Foundation (EFF), a group that defends civil liberties on the Internet, believes the answer is probably "yes". Earlier this month, the San Francisco-based watchdog filed a Freedom of Information Act request with the Federal Bureau of Investigation and other U.S. Department of Justice offices.
It is seeking documents that would shed light on whether the government has been using the USA Patriot Act, which curtails some civil liberties as part of the "war on terror", to spy on Internet users and collect secret information about their on-line activity without a searchwarrant.
LEARN HOW TO ANONYMIZE ALL YOUR INTERNET ACTIVITIES
Most online privacy tools are useless against serious privacy threats. Offshore privacy insiders have known this for years, and have been using their own powerful tools to protect themselves.
Now you can benefit directly from this technology!
3) Favourite Quotations:
"Freedom is not merely the opportunity to do as one pleases; neither is it merely the opportunity to choose between set alternatives. Freedom is, first of all, the chance to formulate the available choices, to argue over them -- and then, the opportunity to choose."
-- C. Wright Mills
4) MPC MEMBERSHIP UPDATE: All New Members joining
the MPC now receive the Stuart Goldsmith Inner Circle
Freedom and Wealth building course without cost! This is a
To learn more about the Inner Circle Course
To join My Privacy Club visit
Please help spread the message of freedom and FORWARD THIS NEWSLETTER to your friends and
add a comment on this article