{"id":107064,"date":"2023-01-20T20:52:34","date_gmt":"2023-01-20T20:52:34","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=107064"},"modified":"2023-01-20T20:52:34","modified_gmt":"2023-01-20T20:52:34","slug":"big-tech-wedded-to-big-government-has-become-big-brother","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/big-tech-wedded-to-big-government-has-become-big-brother\/","title":{"rendered":"Big Tech wedded to Big Government has become Big Brother"},"content":{"rendered":"<p>Mass surveillance is the Deep State\u2019s version of a \u201cgift\u201d that keeps on giving.<\/p>\n<p>Geofencing dragnets. Fusion centres. Smart devices. Behavioural threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps.<\/p>\n<p>What these add up to is a world in which, on any given day, the average American is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-107065 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt1.png\" alt=\"\" width=\"560\" height=\"294\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt1.png 1200w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt1-300x158.png 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt1-1024x538.png 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt1-768x404.png 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>Every second of every day, the American people are being spied on by a vast network of digital Peeping Toms, electronic eavesdroppers, and robotic snoops.<\/p>\n<p>This creepy new era of government\/corporate spying \u2013 in which we\u2019re being listened to, watched, tracked, followed, mapped, bought, sold and targeted \u2013 has been made possible by a global army of techno-tyrants, fusion centres and Peeping Toms.<\/p>\n<p>Consider just a small sampling of the tools being used to track our movements, monitor our spending, and sniff out all the ways in which our thoughts, actions and social circles might land us on the government\u2019s naughty list, whether or not you\u2019ve done anything wrong.<\/p>\n<p><strong>Tracking you based on your phone and movements<\/strong><\/p>\n<p>Mobile or cell phones have become <em>de facto<\/em> snitches, offering up a steady stream of digital location data on users\u2019 movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices, and their owners, in a 4-acre area around the Capitol on 6 January. This latest surveillance tactic could land you in jail for being in the \u201cwrong place and time.\u201d Police are also using cell-site simulators to carry out mass surveillance of protests without the need for a warrant. Moreover, federal agents can now employ several hacking methods to gain access to your computer activities and \u201csee\u201d whatever you\u2019re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.<\/p>\n<p><strong>Tracking you based on your DNA <\/strong><\/p>\n<p>DNA technology in the hands of government officials completes our transition to a Surveillance State. If you have the misfortune to leave your DNA traces anywhere a crime has been committed, you\u2019ve already got a file somewhere in some state or federal database \u2013 albeit it may be a file without a name. By accessing your DNA, the government will soon know everything else about you that they don\u2019t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc. After all, a DNA print reveals everything about \u201c<em>who we are, where we come from, and who we will be<\/em>.\u201d It can also be used to predict the physical appearance of potential suspects. It\u2019s only a matter of time before the police state\u2019s pursuit of criminals expands into genetic profiling and a pre-emptive hunt for criminals of the future.<\/p>\n<p><strong>Tracking you based on your face<\/strong><\/p>\n<p>Facial recognition software aims to create a society in which every person who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to identify and track someone\u2019s movements in real time. One particularly controversial software program created by Clearview AI has been used by police, the FBI and the Department of Homeland Security to collect photos on digital communication networks for inclusion in a massive facial recognition database. Similarly, biometric software, which relies on one\u2019s unique identifiers \u2013 fingerprints, irises, voice prints \u2013 is becoming the standard for navigating security lines, as well as bypassing digital locks and gaining access to phones, computers, office buildings, etc. In fact, greater numbers of travellers are opting into programs that rely on their biometrics to avoid long waits at airport security. Scientists are also developing lasers that can identify and surveil people based on their heartbeats, scents and microbiome.<\/p>\n<p><strong>Tracking you based on your behaviour<\/strong><\/p>\n<p>Rapid advances in behavioural surveillance are not only making it possible for people to be monitored and tracked based on their patterns of movement or behaviour, including gait recognition (the way one walks) but have given rise to whole industries that revolve around predicting one\u2019s behaviour based on data and surveillance patterns and are also shaping the behaviours of whole populations. One smart \u201canti-riot\u201d surveillance system purports to predict mass riots and unauthorised public events by using artificial intelligence to analyse digital communication networks, news sources, surveillance video feeds and public transportation data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-107068 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt2-e1674247830904.jpeg\" alt=\"\" width=\"560\" height=\"353\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt2-e1674247830904.jpeg 800w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt2-e1674247830904-300x189.jpeg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt2-e1674247830904-768x484.jpeg 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p><strong>Tracking you based on your spending and consumer activities<\/strong><\/p>\n<p>With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, and every frequent buyer card we use for purchases \u2013 whether at the grocer\u2019s, the yoghurt shop, the airlines or the department store \u2013 and every credit and debit card we use to pay for our transactions, we\u2019re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time. Consumer surveillance, by which your activities and data in the physical and online realms are tracked and shared with advertisers, has become big business, a $300 billion industry that routinely harvests your data for profit. Corporations such as Target have not only been tracking and assessing the behaviour of their customers, particularly their purchasing patterns, for years, but the retailer has also funded major surveillance in cities across the country and developed behavioural surveillance algorithms that can determine whether someone\u2019s mannerisms might fit the profile of a thief.<\/p>\n<p><strong>Tracking you based on your public activities<\/strong><\/p>\n<p>Private corporations in conjunction with police agencies throughout the country have created a web of surveillance that encompasses all major cities to monitor large groups of people seamlessly, as in the case of protests and rallies. They are also engaging in extensive online surveillance, looking for any hints of \u201c<em>large public events, social unrest, gang communications, and criminally predicated people.<\/em>\u201d Defence contractors have been at the forefront of this lucrative market. Fusion centres, $330 million-a-year, information-sharing hubs for federal, state and law enforcement agencies, monitor and report such \u201csuspicious\u201d behaviour as people buying pallets of bottled water, photographing government buildings, and applying for a pilot\u2019s license as \u201c<em>suspicious activity<\/em>.\u201d<\/p>\n<p><strong>Tracking you based on your digital communication network activities<\/strong><\/p>\n<p>Every move you make, especially on social media, is monitored, mined for data, crunched, and tabulated to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line. As <em>The Intercept<\/em> reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram to identify potential extremists and predict who might engage in future acts of anti-government behaviour. This obsession with digital communication networks as a form of surveillance will have some frightening consequences in the coming years. As Helen A.S. Popkin, writing for <em>NBC News<\/em>, observed, \u201c<em>We may very well face a future where algorithms bust people en masse for referencing illegal \u2018Game of Thrones\u2019 downloads the new software has the potential to roll, Terminator-style, targeting every digital communication network user with a shameful confession or questionable sense of humour<\/em>.\u201d<\/p>\n<p><strong>Tracking you based on your social network<\/strong><\/p>\n<p>Not content to merely spy on people through their online activity, government agencies are now using surveillance technology to track one\u2019s social network, the people you might connect with by phone, text message, email or through social messages, to ferret out possible criminals. An FBI document obtained by <em>Rolling Stone<\/em> speaks to the ease with which agents are able to access address book data from Facebook\u2019s <em>WhatsApp<\/em> and Apple\u2019s <em>iMessage<\/em> services from the accounts of targeted people and persons not under investigation who might have a targeted individual within their network. What this creates is a \u201cguilt by association\u201d society in which we are all as guilty as the most culpable person in our address book.<\/p>\n<p><strong>Tracking you based on your car<\/strong><\/p>\n<p>License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centres and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, affixed to overpasses, cop cars and throughout business sectors and residential neighbourhoods, it allows police to track vehicles and run the plates through law enforcement databases for abducted children, stolen cars, missing people and wanted fugitives. Of course, the technology is not infallible: there have been numerous incidents in which police have mistakenly relied on license plate data to capture out suspects only to end up detaining innocent people at gunpoint.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-107071 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt3-e1674247866804.jpg\" alt=\"\" width=\"560\" height=\"344\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt3-e1674247866804.jpg 915w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt3-e1674247866804-300x184.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2023\/01\/bt3-e1674247866804-768x472.jpg 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p><strong>Tracking you based on your mail<\/strong><\/p>\n<p>Just about every branch of the government \u2013 from the Postal Service to the Treasury Department and every agency in between \u2013 now has its own surveillance sector, authorised to spy on the American people. For instance, the US Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans\u2019 texts, emails and social media posts. Headed up by the Postal Service\u2019s law enforcement division, the Internet Covert Operations Program (\u201ciCOP\u201d) is reportedly using facial recognition technology, combined with fake online identities, to ferret out potential troublemakers with \u201c<em>inflammatory<\/em>\u201d posts. The agency claims the online surveillance, which falls outside its conventional job scope of processing and delivering paper mail, is necessary to help postal workers avoid \u201c<em>potentially volatile situations.<\/em>\u201d<\/p>\n<p>Now the government wants us to believe that we have nothing to fear from these mass spying programs so long as we\u2019ve done nothing wrong.<\/p>\n<p>Do not believe it.<\/p>\n<p>The government\u2019s definition of a \u201cbad\u201d guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.<\/p>\n<p>Surveillance, digital stalking and the data mining of the American people \u2013 weapons of compliance and control in the government\u2019s hands \u2013 haven\u2019t made America any safer. And they certainly aren\u2019t helping to preserve our freedoms.<\/p>\n<p>Indeed, America will never be safe as long as the US government is allowed to shred the <em>Constitution<\/em>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<br \/>\nJanuary 20, 2023<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mass surveillance is the Deep State\u2019s version of a \u201cgift\u201d that keeps on giving. Geofencing dragnets. Fusion centres. Smart devices. Behavioural threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps. What these add up to is a world in which, on any [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[973],"tags":[1516],"class_list":["post-107064","post","type-post","status-publish","format-standard","hentry","category-uncovering-freemasonsrys-manipulations-3480-en","tag-article_of_the_week"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/107064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=107064"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/107064\/revisions"}],"predecessor-version":[{"id":107074,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/107064\/revisions\/107074"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=107064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=107064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=107064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}