{"id":105572,"date":"2023-01-07T20:02:44","date_gmt":"2023-01-07T20:02:44","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=105572"},"modified":"2023-01-07T20:02:44","modified_gmt":"2023-01-07T20:02:44","slug":"youd-better-watch-out-the-surveillance-state-is-making-a-list-and-youre-on-it","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/youd-better-watch-out-the-surveillance-state-is-making-a-list-and-youre-on-it\/","title":{"rendered":"You\u2019d Better Watch Out: The Surveillance State Is Making a List, and You\u2019re On It"},"content":{"rendered":"<p>\u201c<em>He sees you when you\u2019re sleeping<br \/>\nHe knows when you\u2019re awake<br \/>\nHe knows when you\u2019ve been bad or good<br \/>\nSo be good for goodness\u2019 sake!<\/em>\u201d<br \/>\n\u2014\u201c<em>Santa Claus Is Coming to Town<\/em>\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-105573 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1.jpg\" alt=\"\" width=\"560\" height=\"373\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1.jpg 2500w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1-300x200.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1-1024x683.jpg 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1-768x512.jpg 768w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1-1536x1024.jpg 1536w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s1-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>You\u2019d better watch out\u2014you\u2019d better not pout\u2014you\u2019d better not cry\u2014\u2018cos I\u2019m telling you why: this Christmas, it\u2019s the Surveillance State that\u2019s making a list and checking it twice, and it won\u2019t matter whether you\u2019ve been bad or good.<\/p>\n<p>You\u2019ll be on <em>this<\/em> list whether you like it or not.<\/p>\n<p>Mass surveillance is the Deep State\u2019s version of a \u201cgift\u201d that keeps on giving\u2026 back to the Deep State.<\/p>\n<p><u><a href=\"https:\/\/www.wired.com\/story\/fbi-google-geofence-warrant-january-6\/\">Geofencing dragnets<\/a><\/u>. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps.<\/p>\n<p>What these add up to is a world in which, on any given day, the average person is now <u>monitored, surveilled, spied on and tracked in more than 20 different ways<\/u> by both government and corporate eyes and ears.<\/p>\n<p>Big Tech wedded to Big Government has become Big Brother.<\/p>\n<p>Every second of every day, the American people are being spied on by a vast network of digital Peeping Toms, electronic eavesdroppers and robotic snoops.<\/p>\n<p>This creepy new era of government\/corporate spying\u2014in which we\u2019re being listened to, watched, tracked, followed, mapped, bought, sold and targeted\u2014has been made possible by a global army of techno-tyrants, fusion centers and Peeping Toms.<\/p>\n<p>Consider just a small sampling of the tools being used to track our movements, monitor our spending, and sniff out all the ways in which our thoughts, actions and social circles might land us on the government\u2019s naughty list, whether or not you\u2019ve done anything wrong.<\/p>\n<p><strong>Tracking you based on your phone and movements<\/strong>: Cell phones have become de facto snitches, offering up a steady stream of digital location data on users\u2019 movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices (and their owners) in a 4-acre area around the Capitol on January 6. This latest surveillance tactic could land you in jail for being in the \u201cwrong place and time.\u201d Police are also using <u><a href=\"https:\/\/www.eff.org\/deeplinks\/2020\/06\/quick-and-dirty-guide-cell-phone-surveillance-protests\">cell-site simulators to carry out mass surveillance of protests<\/a><\/u> without the need for a warrant. Moreover, federal agents can now employ a number of hacking methods in order to gain access to your computer activities and \u201csee\u201d whatever you\u2019re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-105576 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s2-e1673121684897.jpg\" alt=\"\" width=\"560\" height=\"395\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s2-e1673121684897.jpg 897w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s2-e1673121684897-300x211.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s2-e1673121684897-768x541.jpg 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p><strong>Tracking you based on your DNA. <\/strong><u><a href=\"https:\/\/www.forbes.com\/sites\/kevinunderhill\/2013\/06\/06\/justice-scalia-and-the-genetic-panopticon\/?sh=1331e5440844\">DNA technology in the hands of government officials completes our transition to a Surveillance State<\/a><\/u>. If you have the misfortune to leave your DNA traces anywhere a crime has been committed, you\u2019ve already got a file somewhere in some state or federal database\u2014albeit it may be a file without a name. By accessing your DNA, the <u><a href=\"https:\/\/www.nytimes.com\/2015\/02\/24\/science\/building-face-and-a-case-on-dna.html\">government will soon know everything else about you that they don\u2019t already know<\/a><\/u>: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc. After all, a DNA print reveals everything about \u201c<em><u><a href=\"http:\/\/www.theblaze.com\/stories\/2015\/03\/04\/how-the-dna-youre-shedding-constantly-can-be-obtained-and-tested-by-police-without-consent\/\">who we are, where we come from, and who we will be<\/a><\/u><\/em>.\u201d It can also be used to <u><a href=\"https:\/\/www.theguardian.com\/australia-news\/2021\/dec\/08\/how-australian-police-will-use-dna-sequencing-to-predict-what-suspects-look-like\">predict the physical appearance<\/a><\/u> of potential suspects. It\u2019s only a matter of time before the police state\u2019s pursuit of criminals expands into <u><a href=\"https:\/\/www.vice.com\/en\/article\/8qxgnx\/genetic-profiling-and-predictive-policing-are-taking-us-to-the-pre-crime-future\">genetic profiling<\/a><\/u> and a <u><a href=\"https:\/\/blogs.nottingham.ac.uk\/makingsciencepublic\/2014\/09\/12\/science-politics-and-epigenetics\/\">preemptive hunt for criminals of the future<\/a><\/u>.<\/p>\n<p><strong>Tracking you based on your face<\/strong>: Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to identify and track someone\u2019s movements in real-time. One particularly controversial software program created by Clearview AI has been <u><a href=\"https:\/\/www.cnet.com\/news\/clearview-ai-set-to-get-patent-for-controversial-facial-recognition-tech\/\">used by police, the FBI and the Department of Homeland Security to collect photos on social media sites<\/a><\/u> for inclusion in a massive facial recognition database. Similarly, biometric software, which relies on one\u2019s unique identifiers (fingerprints, irises, voice prints), is becoming the <u><a href=\"https:\/\/www.nytimes.com\/2021\/12\/07\/travel\/biometrics-airports-security.html\">standard for navigating security lines, as well as bypassing digital locks and gaining access to phones, computers, office buildings<\/a><\/u>, etc. In fact, greater numbers of travelers are opting into programs that rely on their biometrics in order to avoid long waits at airport security. Scientists are also developing lasers that can <u><a href=\"https:\/\/www.wired.co.uk\/article\/surveillance-technology-biometrics\">identify and surveil individuals based on their heartbeats, scent and microbiome<\/a><\/u>.<\/p>\n<p><strong>Tracking you based on your behavior<\/strong>: Rapid advances in <u><a href=\"https:\/\/www.wired.co.uk\/article\/surveillance-technology-biometrics\">behavioral surveillance<\/a><\/u> are not only making it possible for individuals to be monitored and tracked based on their patterns of movement or behavior, including gait recognition (the way one walks), but have given rise to whole <u><a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jan\/20\/shoshana-zuboff-age-of-surveillance-capitalism-google-facebook\">industries that revolve around predicting one\u2019s behavior<\/a><\/u> based on data and surveillance patterns and are also shaping the behaviors of whole populations. One smart \u201canti-riot\u201d surveillance system purports to <u><a href=\"https:\/\/www.biometricupdate.com\/202112\/rostec-turns-behavior-analytics-development-to-smart-anti-riot-surveillance-system\">predict mass riots and unauthorized public events<\/a><\/u> by using artificial intelligence to analyze social media, news sources, surveillance video feeds and public transportation data.<\/p>\n<p><strong>Tracking you based on your spending and consumer activities<\/strong>: With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases\u2014whether at the grocer\u2019s, the yogurt shop, the airlines or the department store\u2014and every credit and debit card we use to pay for our transactions, we\u2019re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time. Consumer surveillance, by which your activities and data in the physical and online realms are tracked and shared with advertisers, has become big business, <u><a href=\"https:\/\/thereboot.com\/how-surveillance-advertising-seized-our-data-and-hijacked-the-web\/\">a $300 billion industry that routinely harvests your data for profit<\/a><\/u>. Corporations such as Target have not only been tracking and assessing the behavior of their customers, particularly their purchasing patterns, for years, but the retailer has also funded major surveillance in cities across the country and developed behavioral surveillance <u><a href=\"https:\/\/www.bloomberg.com\/news\/features\/2021-08-25\/how-target-tgt-police-surveilled-black-neighbors-in-inner-cities\">algorithms that can determine whether someone\u2019s mannerisms might fit the profile of a thief<\/a><\/u>.<\/p>\n<p><strong>Tracking you based on your public activities<\/strong>: Private corporations in conjunction with police agencies throughout the country have created <u><a href=\"https:\/\/www.atlantamagazine.com\/news-culture-articles\/atlantas-surveillance-network-keeps-growing-and-growing-and\/\">a web of surveillance that encompasses all major cities<\/a><\/u> in order to monitor large groups of people seamlessly, as in the case of protests and rallies. They are also engaging in extensive online surveillance, looking for any hints of \u201c<em><u><a href=\"https:\/\/arstechnica.com\/tech-policy\/2013\/09\/how-the-cops-watch-your-tweets-in-real-time\/\">large public events, social unrest, gang communications, and criminally predicated individuals<\/a><\/u><\/em>.\u201d Defense contractors have been at the forefront of this <u><a href=\"https:\/\/www.computerworld.com\/article\/2474444\/raytheon-riot-software-tracks-people--predicts-future-behavior.html\">lucrative market<\/a><\/u>. Fusion centers, <u><a href=\"https:\/\/www.nbcnews.com\/business\/business-news\/20-years-after-9-11-fusion-centers-have-done-little-n1278949\">$330 million-a-year, information-sharing hubs<\/a><\/u> for federal, state and law enforcement agencies, <u><a href=\"https:\/\/www.eff.org\/deeplinks\/2014\/04\/why-fusion-centers-matter-faq\">monitor and report such \u201csuspicious\u201d behavior as people buying pallets of bottled water<\/a><\/u>, photographing government buildings, and applying for a pilot\u2019s license as \u201csuspicious activity.\u201d<\/p>\n<p><strong>Tracking you based on your social media activities<\/strong>: Every move you make, especially on social media, is monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line. As <em>The Intercept<\/em> <u><a href=\"https:\/\/theintercept.com\/2016\/04\/14\/in-undisclosed-cia-investments-social-media-mining-looms-large\/\">reported<\/a><\/u>, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. This obsession with social media as a form of surveillance will have some <u><a href=\"https:\/\/www.nbcnews.com\/technolog\/careful-what-you-tweet-police-schools-tap-social-media-track-4b11215908\">frightening consequences in coming years<\/a><\/u>. As Helen A.S. Popkin, writing for <em>NBC News<\/em>, observed, \u201c<em>We may very well face a future where <u><a href=\"https:\/\/www.nbcnews.com\/technolog\/careful-what-you-tweet-police-schools-tap-social-media-track-4b11215908\">algorithms bust people en masse for referencing illegal \u2018Game of Thrones\u2019 downloads<\/a><\/u>\u2026 the new software has the potential to roll, Terminator-style, targeting every social media user with a shameful confession or questionable sense of humor.<\/em>\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-105579\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s3.jpg\" alt=\"\" width=\"560\" height=\"399\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s3.jpg 600w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/s3-300x214.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p><strong>Tracking you based on your social network<\/strong>: Not content to merely spy on individuals through their online activity, government agencies are now using <u><a href=\"https:\/\/www.theguardian.com\/us-news\/2021\/nov\/17\/los-angeles-police-surveillance-social-media-voyager\">surveillance technology to track one\u2019s social network<\/a><\/u>, the people you might connect with by phone, text message, email or through social message, in order to ferret out possible criminals. An FBI document obtained by <em>Rolling Stone<\/em> speaks to the ease with which agents are <u><a href=\"https:\/\/www.rollingstone.com\/politics\/politics-features\/whatsapp-imessage-facebook-apple-fbi-privacy-1261816\/\">able to access address book data from Facebook\u2019s WhatsApp and Apple\u2019s iMessage services<\/a><\/u> from the accounts of targeted individuals <em>and<\/em> individuals not under investigation who might have a targeted individual within their network. What this creates is a \u201cguilt by association\u201d society in which we are all as guilty as the most culpable person in our address book.<\/p>\n<p><strong>Tracking you based on your car<\/strong>: License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, affixed to overpasses, cop cars and throughout business sectors and residential neighborhoods, it allows police to track vehicles and run the plates through law enforcement databases for abducted children, stolen cars, missing people and wanted fugitives. Of course, the technology is not infallible: there have been numerous incidents in which <u><a href=\"https:\/\/www.seattletimes.com\/business\/technology\/license-plate-scanners-were-supposed-to-bring-peace-of-mind-instead-they-tore-the-neighborhood-apart\/\">police have mistakenly relied on license plate data<\/a><\/u> to capture out suspects only to end up detaining innocent people at gunpoint.<\/p>\n<p><strong>Tracking you based on your mail<\/strong>: Just about every branch of the government\u2014from the Postal Service to the Treasury Department and every agency in between\u2014<u><a href=\"https:\/\/nsa.gov1.info\/partners\/index.html\">now has its own surveillance sector<\/a><\/u>, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been <em><u><a href=\"https:\/\/reason.com\/2013\/07\/03\/us-post-office-taking-pictures-of-all-ou\/\">photographing the exterior of every piece of paper mail<\/a><\/u><\/em> for the past 20 years, is also spying on Americans\u2019 texts, emails and social media posts. Headed up by the Postal Service\u2019s law enforcement division, the <u><a href=\"https:\/\/news.yahoo.com\/the-postal-service-is-running-a-running-a-covert-operations-program-that-monitors-americans-social-media-posts-160022919.html\">Internet Covert Operations Program<\/a><\/u> (iCOP) is reportedly <u><a href=\"https:\/\/www.dailymail.co.uk\/news\/article-9595879\/USPS-uses-facial-recognition-Clearview-AI-fake-identities-online-snoop-Americans.html\">using facial recognition technology, combined with fake online identities<\/a><\/u>, to ferret out potential troublemakers with \u201cinflammatory\u201d posts. The agency claims the online surveillance, which falls outside its conventional job scope of processing and delivering paper mail, is necessary to help postal workers avoid \u201c<u><a href=\"https:\/\/www.dailymail.co.uk\/news\/article-9595879\/USPS-uses-facial-recognition-Clearview-AI-fake-identities-online-snoop-Americans.html\">potentially volatile situations<\/a><\/u>.\u201d<\/p>\n<p>Now the government wants us to believe that we have nothing to fear from these mass spying programs as long as we\u2019ve done nothing wrong.<\/p>\n<p>Don\u2019t believe it.<\/p>\n<p>The government\u2019s definition of a \u201cbad\u201d guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.<\/p>\n<p>As I make clear in my book <em>Battlefield America: The War on the American People<\/em> and in its fictional counterpart <em>The Erik Blair Diaries<\/em>, surveillance, digital stalking and the data mining of the American people\u2014weapons of compliance and control in the government\u2019s hands\u2014haven\u2019t made America any safer. And they certainly aren\u2019t helping to preserve our freedoms.<\/p>\n<p>Indeed, America will never be safe as long as the U.S. government is allowed to shred the Constitution.<\/p>\n<p><em>Authors: John &amp; Nisha Whitehead<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<br \/>\nJanuary 7, 2023<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cHe sees you when you\u2019re sleeping He knows when you\u2019re awake He knows when you\u2019ve been bad or good So be good for goodness\u2019 sake!\u201d \u2014\u201cSanta Claus Is Coming to Town\u201d You\u2019d better watch out\u2014you\u2019d better not pout\u2014you\u2019d better not cry\u2014\u2018cos I\u2019m telling you why: this Christmas, it\u2019s the Surveillance State that\u2019s making a list [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[973],"tags":[],"class_list":["post-105572","post","type-post","status-publish","format-standard","hentry","category-uncovering-freemasonsrys-manipulations-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/105572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=105572"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/105572\/revisions"}],"predecessor-version":[{"id":105582,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/105572\/revisions\/105582"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=105572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=105572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=105572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}