It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by HappilyEverAfter
reply to post by grahag
Clarity!
"If" fear is generated from the simple proposed scenarios I present,
it is the abuse of the technology, the idea of its implementation of the subject matter that has that cause, not myself.
I understand you have a vested interest in this as you work within the field and would possibly benefit from it in some way.
You've also let it be known that you dont have a problem with the technology.
Now to flip it around like I'm a fearmonger, is a little wrong I'd say.
Even alluding to me using a tactic that tptb employ is a no no.
The talk is global of an introduction to this into daily use in our lives.
This isnt isolated fantasy or fear drumming on my part, this is a genuine concern.
I travel a very wide and deep path in this world, and there have been very very very few people that welcome even the thought of this, and not just in the states.
If it causes fear, then "IT" causes fear, not I.
Kind of like me saying "fire" and being blamed for the burns,
no sir, it's the fire that will burn you, not my words.
Just so long as we have some clarity on this, I dont like to be misunderstood or have someone else define my words or intentions.
Originally posted by grahag
More like yelling "Fire" and then being blamed for people being trampled.
Amazon Review :
Was IBM, "The Solutions Company," partly responsible for the Final Solution? That's the question raised by Edwin Black's IBM and the Holocaust, the most controversial book on the subject since Daniel Jonah Goldhagen's Hitler's Willing Executioners.
Black, a son of Holocaust survivors, is less tendentiously simplistic than Goldhagen, but his thesis is no less provocative: he argues that IBM founder Thomas Watson deserved the Merit Cross (Germany's second-highest honor) awarded him by Hitler, his second-biggest customer on earth.
"IBM, primarily through its German subsidiary, made Hitler's program of Jewish destruction a technologic mission the company pursued with chilling success," writes Black.
"IBM had almost single-handedly brought modern warfare into the information age [and] virtually put the 'blitz' in the krieg."
The crucial technology was a precursor to the computer, the IBM Hollerith punch card machine, which Black glimpsed on exhibit at the U.S. Holocaust Museum, inspiring his five-year, top-secret book project.
The Hollerith was used to tabulate and alphabetize census data.
Black says the Hollerith and its punch card data ("hole 3 signified homosexual ... hole 8 designated a Jew") was indispensable in rounding up prisoners, keeping the trains fully packed and on time, tallying the deaths, and organizing the entire war effort.
Hitler's regime was fantastically, suicidally chaotic; could IBM have been the cause of its sole competence: mass-murdering civilians?
Better scholars than I must sift through and appraise Black's mountainous evidence, but clearly the assessment is overdue.
The moral argument turns on one question: How much did IBM New York know about IBM Germany's work, and when? Black documents a scary game of brinksmanship orchestrated by IBM chief Watson, who walked a fine line between enraging U.S. officials and infuriating Hitler.
He shamefully delayed returning the Nazi medal until forced to--and when he did return it, the Nazis almost kicked IBM and its crucial machines out of Germany.
(Hitler was prone to self-defeating decisions, as demonstrated in How Hitler Could Have Won World War II.)
Originally posted by grahag
I USE the technology, but don't have a stake in it other than securing customer data. The only benefit I get from it is knowing that it's harder to steal information because of it.
Originally posted by grahag
Because I control this technology where I work, I do have a certain power over whether people get access to areas. Do I ever misuse this power? No. Have I been tempted? Yes. The day that I misuse it is the day it should be taken out of my hands and the same goes for ANY power.
Originally posted by grahag
You're definitely fear-mongering and if you make me prove it, I'll take the time to scour this thread to copy and paste EVERY ONE OF the examples in a response, but I'm hoping you won't make me go to that trouble just to prove my point. Playing on people's fears just makes people like me come out of the woodwork to try to counter the fear with information. And brother, I have a LOT of information about this particular subject. You might even call me an expert in the field. I'm well-read, if not educated and willing to backup everything I say. You might even inspire me to start my own thread, which would be a first here, but I do love to hear myself talk.
Quote from : International Business Machine]Wikipedia : I.B.M. : History
The company which became IBM was founded in 1896 as the Tabulating Machine Company by Herman Hollerith, in Broome County, New York (Endicott, New York or Binghamton, New York), where it still maintains very limited operations.
It was incorporated as Computing Tabulating Recording Corporation on June 16, 1911, and was listed on the New York Stock Exchange in 1916 by George Winthrop Fairchild.
CTR's Canadian and later South American subsidiary was named International Business Machines in 1917, and the whole company took this name in 1924 when Thomas J. Watson took control of it.
IBM's first U.S. trademark was for the name "THINK" filed as a U.S. trademark on June 6, 1935.
"THINK" was the IBM philosophy Watson summarized with a motto consisting of one word.
The name was attributed to a monthly magazine called Think, that was distributed to the employees of IBM in the 1930s.
A U.S. trademark for "IBM" was not filed until approximately 14 years later, on May 24, 1949.
Quote from : Destron Fearing Website
Destron Fearing is a global leader in innovative animal identification.
With presence in over 40 countries worldwide we seek to provide real world ID solutions to match the ever increasing complexity and opportunities related to animal identification.
Since 1945 we have provided innovative products addressing the needs of livestock producers, companion animal owners, horse owners, wildlife managers and government agencies.
Destron Fearing provides a full complement of radio frequency identification products and software solutions to automate the collection of critical livestock production and carcass information.
Individual and herd information can then be easily transferred between all parties involved in the production and retail of meat products.
Information sharing allows the food industry to meet the discriminating demands of the market place.
Quote from : Wikipedia : Applied Digital Solutions
Digital Angel, Inc. (NASDAQ: DIGA) develops global positioning satellite (GPS) and radio frequency identification (RFID) technology products for consumer, commercial, and government sectors worldwide.
Headquartered in Delray Beach, Florida, their products include RFID applications, end-to-end food safety systems, GPS/Satellite communications, and telecommunication, security infrastructure and the controversial Verichip human implant.
Applications for this burgeoning technology include pets, wildlife and livestock identification using implantable microchips, scanners and antennas.
Digital Angel has manufactured RFID microchips for millions of pets throughout the world, providing them with unalterable and permanent identification should they become lost or stolen.
Digital Angel makes RFID products for farmers, ranchers, sale barns and other livestock producers to identify and track animals.
Digital Angel has developed GPS search and rescue beacons that integrate geosynchronous communications for use by the military and the private sector to track aircraft, ships and other high value assets.
Quote from : Electronic Surveillance
Electronic article surveillance (EAS) is a technological method for preventing shoplifting from retail stores or pilferage of books from libraries. Special tags are fixed to merchandise or books.
These tags are removed or deactivated by the clerks when the item is properly bought or checked out.
At the exits of the store, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags.
For high-value goods that are to be manipulated by the patrons, wired alarm clips may be used instead of tags.
Quote from : Wikipedia : Radio Frequency Identification
Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and beyond the line of sight of the reader.
Radio-frequency identification comprises interrogators (also known as readers), and tags (also known as labels).
Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions.
The second is an antenna for receiving and transmitting the signal.
There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range.
There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal.
(Refer to Regulation and standardization below.)
RFID has many applications, for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.
Quote from : Wikipedia : VeriChip
VeriChip is the only Food and Drug Administration (FDA)-approved human-implantable radio-frequency identification (RFID) microchip.
It is marketed by VeriChip Corporation, a subsidiary of Applied Digital Solutions, and it received United States FDA approval in 2004.
About twice the length of a dime, the device is typically implanted between the shoulder and elbow area of an individual’s right arm.
Once scanned at the proper frequency, the VeriChip responds with a unique 16 digit number which could be then linked with information about the user held on a database for identity verification, medical records access and other uses.
The insertion procedure is performed under local anesthetic in a physician's office.
As an implanted device used for identification by a third party, it has generated controversy and debate.
Destron Fearing, a subsidiary of Applied Digital Solutions, initially developed the technology for the VeriChip.
In the beginning of 2007, Verichip Corporation created Xmark, its corporate identity for healthcare products.
Xmark incorporates the Hugs and the Halo system of infant protection; the RoamAlert system of wandering protection; the MyCall emergency response system; and the Assetrac asset tracking system.
Quote from : Wikipedia : Digital Angel
Digital Angel, Inc. (NASDAQ: DIGA) develops global positioning satellite (GPS) and radio frequency identification (RFID) technology products for consumer, commercial, and government sectors worldwide.
Headquartered in Delray Beach, Florida, their products offer security for people, animals, the food supply, government/military arena, and commercial assets.
Included in this product line are RFID applications, end-to-end food safety systems, GPS/Satellite communications, and telecommunication, security infrastructure and the controversial Verichip human implant, a product which has caused concern among advocates of civil liberties.
Applications for this technology include pets, wildlife and livestock identification using implantable RFID microchips, scanners and antennas.
Digital Angel has also researched and developed GPS search and rescue beacons that integrate geosynchronous communications for use by the military and the private sector to track aircraft, ships and other high value assets.
- www.activewaveinc.com...
ActiveWave low power active tags that use the latest technologies, have a long read range combined with the long life and reliability of passive tags.
ActiveWave RFID readers use the latest VLSI integrated circuit and computer technology. This has allowed us to develop RFID readers that are compact enough to be positioned in control panels, or adjacent to other processes.
The core of the system is built around the RFID tags, RFID readers, host computer, and Windows based software. Each tag sends its data periodically. The RFID reader will cross-reference the tag's data within its self-contained database. After the reader receives new data, it will send the data to the host. The readers and the host communicate through a secure wireless link.
ActiveWave RFID systems have multi-tag capability. This means an ActiveWave RFID system can read several tags in the field at the same time. The read range between the tag and the reader is 100 to 140 feet. A single reader can cover a total area of up to 30,000 square feet. The ActiveWave RFID reader's wireless connection to the host computer has a range of approximately 500 to 1000 feet.
ActiveWave RFID integrated solutions have the following features:
Hands free operation
Multi-Tag functionality
High security
Unlimited virtual memory
Easy system integration
Wireless connection between the RFID reader and host computer
User-friendly Windows based host software
Configurable real time inventory update
Very low power, highly reliable active tag technology
Originally posted by HappilyEverAfter
act now and be one of the first to participate in this movement to freedom of care and stress and responsibility and receive $250,000 monetary credits to your account.
Originally posted by HomerinNC
No Chip, No tag, No tracking, NO NOTHING!!!!!