It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Webcam is watching you

page: 5
26
<< 2  3  4    6  7  8 >>

log in

join
share:

posted on Oct, 28 2012 @ 02:59 PM
link   

Originally posted by Hefficide
reply to post by SecretKnowledge
 


Erasing texts doesn't help. They are stored and logged.


~Heff

true. its more for the immediate police stop/hassle



posted on Oct, 28 2012 @ 03:13 PM
link   
I would definitely be one of the "boring" ones to spy on. Although I AM extremely good looking and they could watch me run around the house with no clothing
....

I suppose it depends a lot on the intention of those who may watch. If we feel the government and powers that be are "evil", then it's a big intrusion. If we see them as "out for our best interest", it doesn't bother us as much. I would hazard to guess that most folks are somewhere in the middle so it's enough to make us paranoid, but not riot. I'm sure if I were into more "shady" type things, I would be much more paranoid and would be much more angry about it. I don't "like" it, but I can live with it... since there isn't much I can really do about it



posted on Oct, 28 2012 @ 03:13 PM
link   
I too have a piece of electrical tape on my webcam.

But this thread really is thinking in the current technology, that they have let us have.

How about this scenario. Most people have a mirror in their front room, bedroom, hall, bathroom and others.
Alice in wonderland come to mind?
Vampires are not reflected in a mirror-why ? Because it is a doorway to them.
Now these are just myths, aren't they?

NO. They are future technology that has been given to a few, called Looking glass.

What are TVs but mirrors of a kind?

Now you are saying to me, what I bet many people have said to you.


Well how about what happened to me and my family.

In Sept 2010, on my Facebook account, is me asking a question, Has anything happened to your TV?
(I don't use it now, just to look at Preppers chicks.)
Both my TV and Sky had stopped working. We still own an old Cathode ray tube, which apparently detects if microwave weapons are being used against you, by showing a blue screen of death.
My sister suddenly arrived and I saw three men aiming a gun (of a kind) at our house from the side of a blacked out, slide door transit van. Their engine was idling and I could hear it. As soon as they saw me, they scarpered (left quickly).

A few weeks later I get a weird telephone call on my cordless asking me what is the name of your TV?
I replied I am not telling you and hang up.
A few months later I am up late looking at ATS and over the TV came a voice 'DIE'. Demon or technology you tell me. Obviously they had found out in the meantime. Other people have heard this voice over their TV too.


A weapon has been put in the streetlight outside of our house. I know because two vans turn up to correct a fault and one of the workers just stood there, looking into my front room. I could see him from upstairs. They then left a red painted pavement mark, that looks like a long Greek letter Psy. Maybe for Psychic. (Cos that is how the fault happened in the first place, I 'killed' it. My bad)

Apparently I am a 'person of interest' because it isn't the Rothschilds who are in charge; it's the type that Hitler was scared of. Cosmic war calls them Archons or Fallen Angels. I am not a terrorist but that isn't what they are after anyway-it's people who can see them as they really are and know that I am equal to them.


So keep all mirrors away from areas, you don't want THEM to see, including the TV. Oh yeah and HD TV is so easy for them to see through.
I also have no mirrors opposite a doorway, as this can give them an easier doorway to come through.

And I know they are monitoring my mobile as they cut me off once, when I was telling my hubby about a weird dream I had had about us living in a new timeline. That really shook them up that I might know something about that event too.
I have put that on ATS under dreams.

They have beamed into my bedroom to kill us, as it doesn't take 4 to abduct wearing rifles to a MILAB. I think it was going to be called Murder/suicide. I can't see how they were going to get away with that as we don't have any guns.
Other people have seen the green oval light of the space age technology.

I am not fear mongering. I am just saying this thread is thinking along the lines of CURRENT technology, think 20yrs-40yrs and if you are a 'person of interest' what they use against you will get more futuristic. If you aren't then carry on as you are.

Good luck.



posted on Oct, 28 2012 @ 03:17 PM
link   
Whether or not we are boring isn't really the issue. In the past in order to spy on us, law enforcement required some sort of probable cause - and rarely got away with doing so without that probable cause.

Well, guess what? Now with each post here, each FB status update, every Google search, every single link you click, page you access, and bit of media you interact with - you are giving law enforcement potential fodder for probable cause - especially with the current laws in place, such as the NDAA, Patriot Acts, and Military Commissions Act.

Oh, and not only does digital communications provide the probable cause... it also supplies the means to spy upon us after that fact. Being boring is great... only once a person has red flagged Carnivore, they become very, very interesting to those who get paid to dissect and analyze.

~Heff
edit on 10/28/12 by Hefficide because: typo



posted on Oct, 28 2012 @ 03:38 PM
link   
Taping over your webcam only cuts off one channel of a vast array of surveillance devices. As Hefficide put it, it is the profiling software that puts together surveillance from multiple sources that is the real danger.

The software associates inputs with your profile, removes unchanging data, and analyses content for key words, status, phrases or behaviors and then logs the result.

If the priority is high enough, the profile is flagged for human consideration.

The thing is, the data is stored and can be re-searched later with different parameters to mine for things the original designers didn't think about.

We are heading for a world where every word, every key-press, every action is monitored and stored.

The communications infrastructure has existed since the 50's. The data compression and storage since the 70's, the government will and funding and capability to achieve this since the 80's. We (in the developed world) have been under surveillance for at least three decades!

Think about the software/systems that we know about (like Echelon and Carnivore). Think about how they actually worked and what they actually did. Realize that we only know about them because they have been replaced by newer, more sophisticated systems.

About ten years ago I heard of an anti-government speaker who was traveling across the US giving lectures. In each instance, he'd send faxes of his itinerary and requirements ahead of him. One day he noticed that the received faxes were in a different font. They wouldn't make that mistake these days, or even need to reformat and resend data but it does identify that we are under surveillance and have been for some time.

It has been said that you can walk from one end of London to the other without once being out of camera surveillance. They are also mass producing cameras with microphones and speakers, specifically for mounting on telegraph and signage poles and that are difficult to identify as surveillance devices.

Remember:
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism
Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, SAPM, ASU, ASTS,
National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS,
Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF,
Ermes, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, CUN, CISU,
CUSI, M.A.R.E., MARE, UFO, IFO, Pacini, Angela, Espionage, USDOJ, NSA, CIA,
S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House,
Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet,
AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, SAMU, COSMOS, DATTA,
Furbys, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC,
UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN,
BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA,
JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case,
Tools, RECCEX, Telex, Aldergrove, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL,
NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI,
BRGE, Europol, SARL, Military Intelligence, JICA, Scully, recondo, Flame,
Infowar, FRU, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack,
Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny,
Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC,
bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN,
FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS,
NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O,
NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN,
DJC, LLNL, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE,
bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch,
AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI,
benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda,
Forte, AT, GIGN, Exon Shell, radint, MB, CQB, TECS, CONUS, CTU, RCMP, GRU,
SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary,
MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11,
EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon,
NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, DF, ZARK,
SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DSD, FDM, GRU,
LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM. SUKLO,
Schengen, SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, Mafia, JASSM, CALCM,
TLAM, Wipeout, GII, SIW, MEII, C2W, Burns, Tomlinson, Ufologico Nazionale,
Centro, CICAP, MIR, Belknap, Tac, rebels, BLU-97 A/B, 007, nowhere.ch,
bronze, Rubin, Arnett, BLU, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort,
50MZ, 11Emc Choe, SATCOMA, UHF, The Hague, SHF, ASIO, SASP, WANK, Colonel,
domestic disruption, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX, nitrate,
OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus,
afsatcom, CQB, NVD, Counter Terrorism Security, Enemy of the State, SARA,
Rapid Reaction, JSOFC3IP, Corporate Security, 192.47.242.7, Baldwin, Wilma,
ie.org, cospo.osis.gov, Police, Dateline, Tyrell, KMI, 1ee, Pod, 9705
Samford Road, 20755-6000, sniper, PPS, ASIS, ASLET, TSCM, Security
Consulting, M-x spook, Z-150T, Steak Knife, High Security, Security
Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism,
real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,
NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,
Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID,
7NL SBS, tekka, captain, 226, .45, nonac, .li, Tony Poe, MJ-12, JASON,
Society, Hmong, Majic, evil, zipgun, tax, bootleg, warez, TRV, ERV,
rednoise, mindwar, nailbomb, VLF, ULF, Paperclip, Chatter, MKULTRA, MKDELTA,
Bluebird, MKNAOMI, White Yankee, MKSEARCH, 355 ML, Adriatic, Goldman,
Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson,
Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, BLU-114/B, quarter,
Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell,
B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF,
POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope,
LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan,
Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive,
Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor,
Tarawa, COSMOS-2224, COSTIND, hit word, hitword, Hitwords, Regli, VBS,
Leuken-Baden, number key, Zimmerwald, DDPS, GRS, AGT. AMME, ANDVT, Type I,
Type II, VFCT, VGPL, WHCA, WSA, WSP, WWABNCP, ZNI1, FSK, FTS2000, GOSIP,
GOTS, SACS STU-III, PRF, PMSP, PCMT, I&A, JRSC, ITSDN, Keyer, KG-84C,
KWT-46, KWR-46, KY-75, KYV-5, LHR, PARKHILL, LDMX, LEASAT, SNS, SVN, TACSAT,
TRANSEC, DONCAF, EAM, DSCS, DSNET1, DSNET2, DSNET3, ECCM, EIP, EKMS, EKMC,
DDN, DDP, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ,
MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA,
Porno, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE,
forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top
secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security,
OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco,
TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS,
Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks,
TRW, remailers, replay, redheads, RX-7, explicit, FLAME, J-6, Pornstars,
AVN, Playboy, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20,
subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the,
Elvis, quiche, DES, 1*, N-ISDN, NLSP, OTAR, OTAT, OTCIXS, MISSI, MOSAIC,
NAVCOMPARS, NCTS, NESP, MILSATCOM, AUTODIN, BLACKER, C3I, C4I, CMS, CMW, CP,
SBU, SCCN, SITOR, SHF/DOD, Finksburg MD, Link 16, LATA, NATIA, NATOA,
sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA,
DT, gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI,
spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class
Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics,
sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met,
CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo
Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d,
Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI,
DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO,
burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, coc aine, Vale,
IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux,
Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox,
Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu,
muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS,
Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago
Posse, NSDM, l0ck, beanpole, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC,
Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7,
Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned,
Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash,
zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI,
Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas,
jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer,
bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS,
Planet-1, ISTA, rs9512c, Jiang Zemin, South Africa, Sergeyev, Montenegro,
Toeffler, Rebollo, sorot, Yucca Mountain, FARC, Toth, Xu Yongyue, Bach,
Razor, AC, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA,
INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta
Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops,
O/S, Area51, SABC, basement, ISWG, $@, data-haven, NSDD, black-bag, rack,
TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, ISAF,
unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan,
guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob,
UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms,
MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS,
Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM,
Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith,
Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron,
Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL,
K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro,
ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM,
Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA,
Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump,
joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax,
Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros,
Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6,
Larson, P99, HERF pipe-bomb, 2.3 Oz., coc aine, $, imapct, Roswell, ESN, COS,
E.T., credit card, b9, fraud, ST1, assasinate, virus, ISCS, ISPR, anarchy,
rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium,
William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA,
Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414,
Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton,
Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP,
^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, DC7, Glock 26,
snuffle, Patel, package, ISI, INR, INS, GRU, RUOP, GSS, NSP, SRI, Ronco,
Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM,
SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP,
SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin,
AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC,
Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI,
JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB,
CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut,
SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack,
Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA,
DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package,
CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops,
DCSS, DPSD, LIF, J-Star, PRIME, SURVIAC, telex, Analyzer, embassy, Golf,
B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, Alex, EPL, SPINTCOM,
FOUO, ISS-ADP, Merv, Mexico, SUR, blocks, SO13, Rojdykarna, RSOC, USS
Banner, S511, 20755, airframe, jya.com, Furby, PECSENC, football, Agfa,
3210, Crowell, moore, 510, OADR, Smith, toffee, FIS, N5P6, EuroFed, SP4,
shelter, Crypto AG Croatian nuclear FBI colonel plutonium Ortega Waco, Texas
Panama CIA DES jihad fissionable quiche terrorist World Trade Center
assassination DES NORAD Delta Force Waco, Texas SDI explosion Serbian Panama
Uzi Ft. Meade SEAL Team 6 Honduras PLO NSA terrorist Ft. Meade strategic
supercomputer $400 million in gold bullion quiche Honduras BATF colonel
Treasury domestic disruption SEAL Team 6 class struggle smuggle M55 M51
Physical Security Division Room 2A0120, OPS 2A building 688-6911(b),
963-3371(s). Security Awareness Division (M56) Field Security Division (M52)
Al Amn al-Askari Supreme Assembly of the Islamic Revolution in Iraq (SAIRI)
Binnenlandse Veiligheidsdienst Komitet Gosudarstvennoi Bezopasnosti
Federalnaia sluzhba besopasnosti GCHQ MI5 Kill the president


edit on 28/10/2012 by chr0naut because: You, as a participant in this thread have now been flagged as a "Person of Interest" :-)



posted on Oct, 28 2012 @ 03:39 PM
link   
Guess I'm finally gonna have to get off my lazy butt and whip up enough gusto to give a rat's patooty about big brother and finally electrical tape my webcam. Or not. Mebbe I'll just burp and pick my nose with a renewed "up yours" zest.

The technocracy was planned before the technology existed imo. Arpanet from ARPA soon to be DARPA had our psycho-technological number before Steve Jobs did. Zbigniew Brzezinski:


“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values.

Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities. ”

― Zbigniew Brzezinski, Between Two Ages: America's Role in the Technetronic Era

Yes, we have embraced the fascist psy-clops, the one-eyed monster. With all of our hearts apparently. It's all over but the cryin'.



posted on Oct, 28 2012 @ 03:48 PM
link   
DCS-1000.

And a very educational reference.

~Heff



posted on Oct, 28 2012 @ 03:56 PM
link   

Originally posted by Hefficide
The little things are statistically far more important, in my mind, than the ones many people tend to worry about ( like ZOMG I post to ATS!!! ). I can easily imagine a culture where a social worker or cop could show up at ones door - or workplace - saying "Our systems have alerted us that your browsing habits tend to fit the profile that most _____ fit into".

This tech already exists today, is used in marketing, and is fare more dangerous than most people want to think about. To be undone by our passive and unprotected habits - even as we think we are being "safe".

While I agree that "spying on everyone" is out of the question manpower-wise, I do think the odds of attracting "interest" are greater here at ATS, depending on level of involvement and subject matter.

In regards your other points, unfortunately it doesn't stop at just tracking and figuring out our marketing habits, but involves a full-scale cross-media-matrix to influence us sociologically as well. But you know that. More from DARPA:


"Stories exert a powerful influence on human thoughts and behavior. They consolidate memory, shape emotions, cue heuristics and biases in judgment, influence in-group/out-group distinctions, and may affect the fundamental contents of personal identity.

It comes as no surprise that these influences make stories highly relevant to vexing security challenges such as radicalization, violent social mobilization, insurgency and terrorism, and conflict prevention and resolution. Therefore, understanding the role stories play in a security context is a matter of great import and some urgency," DARPA stated. "Ascertaining exactly what function stories enact, and by what mechanisms they do so, is a necessity if we are to effectively analyze the security phenomena shaped by stories. Doing this in a scientifically respectable manner requires a working theory of narratives, an understanding of what role narratives play in security contexts, and examination of how to best analyze stories-decomposing them and their psychological impact systematically."

According to DARPA, STORyNET has three goals:

1. To survey narrative theories. These empirically informed theories should tell us something about the nature of stories: what is a story? What are its moving parts? Is there a list of necessary and sufficient conditions it takes for a stimulus to be considered a story instead of something else? Does the structure and function of stories vary considerably across cultural contexts or is there a universal theory of story?

2. To better understand the role of narrative in security contexts. What role do stories play in influencing political violence and to what extent? What function do narratives serve in the process of political radicalization and how do they influence a person or group's choice of means (such as violence) to achieve political ends? How do stories influence bystanders' response to conflict? Is it possible to measure how attitudes salient to security issues are shaped by stories?

3. To survey the state of the art in narrative analysis and decomposition tools. How can we take stories and make them quantitatively analyzable in a rigorous, transparent and repeatable fashion? What analytic approaches or tools best establish a framework for the scientific study of the psychological and neurobiological impact of stories on people? Are particular approaches or tools better than others for understanding how stories propagate in a system so as to influence behavior?

www.networkworld.com...



posted on Oct, 28 2012 @ 04:01 PM
link   
reply to post by Hefficide
 


Whether or not we are boring isn't really the issue.

Yep. In fact the issue is why aren't you hooked up to all these devices? Don't you want to belong to our New Utopia? Oh, I get it... you are a dissident (insert witch hunt).


...with each post here, each FB status update, every Google search, every single link you click, page you access, and bit of media you interact with - you are giving law enforcement potential fodder for probable cause - especially with the current laws in place, such as the NDAA, Patriot Acts, and Military Commissions Act.

Might as well type up your web activity and stick it thru the night slot of your local Fusion center.

The trend to cameras everywhere, cell phone trackers and "smart" cards, etc. can only lead to one place...

Oh, never mind, we're already there.



posted on Oct, 28 2012 @ 04:13 PM
link   
reply to post by intrptr
 


Next year, probably in September, most fusion centers will start feeding "Stellar Wind". Then, I think, they will have the capacity to break pretty much any encryption real-time, to store all the data and to search it very quickly!



posted on Oct, 28 2012 @ 04:20 PM
link   
Thanx for the links Heff, you give great input!

All of this "surveillance" that seems to have sprouted around us overnight like so many mushrooms is really just the "data gathering" phase. Like Interpol of a bygone pre WWII era, the "files" on everyone are being compiled in order to better facilitate actions in the future. Labeling everybody first, then using it as actionable intel when the time comes.

In my opinion that time will be when the next (BIG) financial "induced" crash occurs and all its fallout. Assets confiscated, "new" money issued, relocations and big work projects begun. Then a war to restart the new New Deal. Just like after the crash of 1929.

Individuals will be reassigned based on all this internet and "real world" surveillance data over the last couple of decades. Either you will be marked as a player... or not. Even if you don't play now, that will still categorize you negatively. Hiding form the NWO instead of embracing it will be a crime.

Until then type away you rebel scum... your thoughts are safe... for now.



posted on Oct, 28 2012 @ 04:30 PM
link   

Originally posted by chr0naut
reply to post by intrptr
 

Next year, probably in September, most fusion centers will start feeding "Stellar Wind". Then, I think, they will have the capacity to break pretty much any encryption real-time, to store all the data and to search it very quickly!

They can have my key board when they pry it from my cold, dead fingers.

Did any one ever see the Movie "Missing" with Jack Lemon and Sissy Spacek?
About Chile and uhhh... shhh, (US involvement)...


Edit: Highly recommended. It was made decades ago about the same things talked about today on the Internet.


edit on 28-10-2012 by intrptr because: additional...



posted on Oct, 28 2012 @ 04:50 PM
link   
reply to post by DirtyLiberalHippie
 


I tape the ones at public computers too.



posted on Oct, 28 2012 @ 05:00 PM
link   

Originally posted by riverwild

Originally posted by beezzer

Originally posted by DirtyLiberalHippie
To be perfectly honest...I always have a piece of electrical tape covering the webcam on my lap top and the built in mic was fried a long time ago. Why do I keep a piece of tape over it? I don't know really. The best answer I can give is... Just in case....

I guess ATS has had that effect on me, over the years.


Honestly,if anyone were to hack into my webcam to watch, they would be bored to tears within minutes....But...I still cover it up... Again...Just in case.

edit on 28-10-2012 by DirtyLiberalHippie because: (no reason given)




*whew*

Glad I'm not the only one!


Looks like I am in with some fine company!

I have a band-aid over mine.




I have thought about putting tape over my cam, but my sister likes to speak to me face to face now and again (she lives a few hundred miles away) band aid/plaster seems a good idea though, I know what Im shopping for tomorrow thanks OP



posted on Oct, 28 2012 @ 05:16 PM
link   
I bought a webcam a few years back for use at work.

I needed some software to enable me to make a time lapse collection of pictures which could be automatically uploaded via FTP.

I found a great piece of software and after a while I noticed som unexpected data traffic. It turned out - after using some sniffing software - that every 10 seconds the software uploaded a picture to a server based in the domain .ru

Needless to say we discontinued this software, but from that day all our web cams are off-line when we don't use them.

Off-line to the extent that leads gets pulled and internal cameras covered.



posted on Oct, 28 2012 @ 05:28 PM
link   

Originally posted by SecretKnowledge
i dont have a gps in the car
i dont have a webcam
i dont have a fakebook account
i dont have an amazon account
i dont have an i-phone
i have a broadband account and thats it
i reckon im in a very small minority


And you don't have an Avatar


What about the cameras in cellphones and iPads as well? Maybe they could be hacked?
edit on 28-10-2012 by scotsdavy1 because: (no reason given)



posted on Oct, 28 2012 @ 06:04 PM
link   
Being a Viet Nam vet and 66, I've learned not to care about any of the invasive ways "they" can surveil me. What I am concened about is what it will take for "them" to come for a visit....being a good host, I just want to be able to properly greet "them."



posted on Oct, 28 2012 @ 06:05 PM
link   
if you can skype with your computer, then it can be remotely accessed.

i don't even think it would be that hard.

windows is hardly the epitome of computer and online security.



posted on Oct, 28 2012 @ 06:05 PM
link   

Originally posted by SecretKnowledge
i dont have a gps in the car
i dont have a webcam
i dont have a fakebook account
i dont have an amazon account
i dont have an i-phone
i have a broadband account and thats it
i reckon im in a very small minority


I suppose we are.


I have the basics because that's all I need. I don't concern myself with toys so I can keep up with the Jones'. The Jones' haven't proven themselves smart enough for me to follow.

Some people fail to realize just how realistically impossible it is for "TPTB" to monitor everyone all the time. People are so overly paranoid about themselves, it blinds them from the reality of the situation.

Yes.............I'm anti-social.



posted on Oct, 28 2012 @ 08:33 PM
link   

Originally posted by Kr0nZ

Originally posted by OccamAssassin
I have a webcam that can't be activated without my knowing and I have never had an instance of it switching on automatically.


Just an FYI, malware/trojans/virues can include their own webcam driver that can be used to activate most webcams. So just because your webcam software says its not turned on, doesn't mean it isn't. Unless, ofc, your webcam has a hardware switch or folds down into itself, which no amount of hacking could overcome.


Unless those malwares are digitally signed by microsoft, there is just no way it installs a driver by itself on modern computer without clearly informing the user and asking him confirmation.
The best they could do is accessing the webcams at low level (interracting withthe usb bus), but basically, that would require specific different code for almost all models of webcam and make the malware so big in size that it would take a long time to download / upload itself, so spreading itself. A such concept would just kill the "malware ideology" that implies that it has to be easyly spreadable. Plus it would require additionnal code each time a new webcam come out in the market... That's just unrealistic.

I'm open-minded about the fact that "big companies" can spy you with webcam, and that's most likely true for some of them, but not at all on that measure... The biggest potential-malware is the software you use your webcam with. but what you're suggesting is too unrealistic to be considered otherwise than paranoia.
Btw, the black tape on the laptop is still a good idea if you're not familiar with disabling the hardware. but that would still be quickly noticed by the internet bandwidth it consumes if your webcam was activated without your consent.



new topics

top topics



 
26
<< 2  3  4    6  7  8 >>

log in

join