You can be spied on even when your cellphone is off!!!

by ohiocowboy 71 Replies latest social current

  • tula
    tula

    LAND Z-Backscatter Van in Action ZBV in action
    (click to view full)

    The Z-Backscatter vans can scan vehicles while the system itself is moving, scanning an entire row of parked cars in a single pass-through and producing clear images. They can also be operated in stationary mode by parking the system and producing X-ray images of vehicles as they pass by. In high-threat areas, a stationary mode van can even be operated remotely from up to 500 meters/ 0.3 miles away.

    The technology’s abilities include near-photo quality views through clothes when used in airport screening systems, which caused something of a privacy uproar. Questions have also been raised re: the health risks to those scanned, which may well be ignored in situations of war or insurrection, but become a live issue when proposed as an requirement for popular activities like airline travel.

    Jan 2/08: AS&E announces “a multi-million dollar order” for the OmniView™ Gantry system and the Z Backscatter Van™ (ZBV) from its local distributor in Italy, AUS.TECH S.p.A. The systems will be deployed to inspect cargo and vehicles entering a major, high-volume Italian port. The OmniView Gantry combines 6.0 MeV high-energy transmission with 3 Z-Backscatter imaging modules to provide left, right, and top-views.

    Oct 10/07:AS&E announces that the U.S Government has purchased its first Z Portal™ drive-through screening system with three Z Backscatter imaging modules (left, right, and top-view) and Forwardscatter™ technology, and reordered 3 Z-Backscatter™ Vans (ZBV), for inspecting trucks and passenger cars in high-volume traffic areas. The contracts are valued at $3.9 million, and include installation, and operator training.

    With this order, AS&E states that “over 300 ZBVs will be deployed worldwide for force protection, VIP and event security, law enforcement, and port and border security.”

    People are unknowingly being scanned on the highway. These things can also go into neighborhoods and scan your homes.

  • ohiocowboy
    ohiocowboy

    Tula,

    Thanks for the site info. I can't wait to read more about it.

    I did stumble across this picture from the site. We are having our freedoms stripped from us, and there will be nothing we can do about it. I am all for catching criminals, but it seems that people will feel like they are walking on eggshells in their own home, and in their daily lives, knowing they are being watched. This will not provide for a healthy environment.

  • tula
    tula

    The ZBV can also be operated in stationary mode* by parking the system and producing X-ray images of vehicles as they pass by. Screening can also be accomplished remotely while the system is parked. Remote operation allows scanning to be done safely, even in dangerous environments, while maintaining low-profile operation. The system is unobtrusive, as it maintains the outward appearance of an ordinary van.

    The Z Backscatter Van is used in port and border security, force protection, urban surveillance, and other critical security applications. The system is maneuverable, mobile and affordable. Simply put, the ZBV is faster, more effective, and less expensive than any mobile X-ray screening solution in the marketplace today.

    The ZBV Reveals Contraband and Threats Undetected by Other Systems:

    • Car and truck bombs
    • Explosives, plastic weapons, and other organic threats
    • Radioactive threats, including nuclear devices and dirty bombs
    • Illegal drugs
    • Stowaways, such as illegal immigrants and terrorists
    • Trade fraud items, such as alcohol, tobacco, and other legal goods smuggled to evade duties (can they read your brand of smokes?)

    * In Stationary Scan Mode, ZBV operators may elect to scan the occupants of the subject vehicle. For this application, AS&E offers a Personnel Scanning option that may better enable the customer to meet any applicable country-specific regulatory requirements.

    I wonder how many people know about this.

    Another bogus "security" item. It is for ultimate control.

    They can park this van on your street and count every box or can of food in your pantry.

    They can see how many people are inside your home.

    Of course they can detect weapons in your home, silly.

  • tula
    tula

    And then, there's "soft surveillence".........

    The theme of volunteering as good citizenship or patriotism can increasingly be seen in other contexts. Consider a Justice Department “Watch Your Car” program found in many states. Decals which car owners place on their vehicles serve as an invitation to police anywhere in the United States to stop the car if driven late at night. Taxi-cabs in some cities beyond transmitting video images, also invite police to stop and search them without cause, --presumably such searches extend to passengers as well who see the notice and choose to enter the cab.

    Another form involves disingenuous communication that seeks to create the impression that one is volunteering when that really isn’t the case.

    • the ubiquitous building signs, “In entering here you have agreed to be searched.”
    • a message from the Social Security Administration to potential recipients, “while it is voluntary for you to furnish this information, we may not be able to pay benefits to your spouse unless you give us the information.”
    • a Canadian airport announcement: “Notice: Security measures are being taken to observe and inspect persons. No passengers are obliged to submit to a search of persons or goods if they choose not to board our aircraft.”

    The New York subway system has supplemented the random searches of officers with automated searching by sensing machines. Potential riders need not submit, but then they may not use the subway.

    Information collection is unseen and automated (how about the discount "preferred customer cards you use at the grocery store......you have to fill out personal info to get them. Your weekly groceries become a part of "customer profiling". The computer knows who you are. )

    Computers scan dispersed personal records for suspicious cases, avoiding, at least initially, any direct review by a human. Similarly x-ray and scent machines “search” persons and goods for contraband without touching them. Inkless fingerprints can be taken without the stained thumb symbolic of the arrested person. Classified government programs are said to permit the remote reading of computers and their transmissions without the need to directly install a bugging device.

    Whatever can be revealed from the analysis of blood or urine is also potentially found (although in smaller quantities) in saliva –not only evidence of disease and DNA, but also of drugs taken and pregnancy. This may also be the case for human odor. The recent development of nonelectrical sensors now make it possible to detect molecules at minute levels in saliva. ( New York Times , April 19, 2005).

    In many of these cases citizens are at least informed of what is going on, even if the meaning of their consent is often open to question. More troubling is the development of tactics that need not rely on the subject consenting, or even being informed, let alone receiving carrots or avoiding sticks in agreeing to cooperate. New hidden or low visibility technologies increasingly offer the tempting possibility of by-passing awareness, and thus any need for direct consent or other oversight, altogether.

    New technologies overcome traditional barriers such as darkness or walls. Night vision technology illuminates what darkness traditionally protected (and the technology is itself protected, unlike an illuminated spotlight). Thermal imaging technology applied from outside can offer a rough picture of a building’s interior based on heat patterns. There is no need for an observer to enter the space. NSA’s satellites engage in warrantless remote monitoring of electronic communication to, or from the United States.

    A person’s DNA can be collected from a drinking glass or from discarded dental floss. Facial scanning technology only requires a tiny lens. Smart machines can “smell” contraband eliminating the need for a warrant or asking the sniffed for permission to invade their olfactory space or “see” through their clothes and luggage. Research is also being done with the goal of using human odor to identify specific persons, illness (both mental and physical) and even early pregnancy. 9 . A vacuum like device is also available that can draw the breath away from a person suspected of drunk driving without the need to ask permission.

    Beyond the traditional reading of visual clues offered by facial expression, there are claims that the covert analysis of heat patterns around the eyes and of tremors in the voice and measuring brain wave patterns offer windows into feelings and truth telling. 10 . The face still remains a tool for protecting inner feelings and thoughts, but for how long? Different issues are raised by recent improvements in the technology of face transplanting.

    Individuals need not be informed that their communication devices, vehicles, wallet cards and consumer items increasingly will have RFID (Radio Frequency Identification) chips embedded in them. These can be designed to be passively read from up to 30 feet away by unseen sensors. 11 .

    In the convoluted logic of those who justify covert (or non-informed) data collection and use, individuals “volunteer” their data by walking or driving on public streets, entering a shopping mall and by failing to hide their faces, wear gloves and encrypt their communication, or by choosing to use a phone, computer or a credit card. The statement of a direct marketer nicely illustrates this: “never ever underestimate the willingness of the American public to tell you about itself. That data belongs to us!

    read more at http://web.mit.edu/gtmarx/www/softsurveillance.html

  • tula
    tula

    Isn't this a bit like WTS speak? Trickery and double talk? Subtle coersion?

    The accompanying rhetoric is often dishonest and even insulting to one’s intelligence. Consider a phone company executive who, in defense of unblockable Caller-ID, said, “when you choose to make a phone call you are choosing to release your telephone number”. In the same World Cup League of Disingenuity is the statement of a personnel manager in a one-industry town, “we don’t require anyone to take a drug test, only those who choose to work here.”

  • Caedes
    Caedes

    A couple of points, 
    Google earth uses a mixture of satellite images and arial photography or had you not noticed that it works even 
    when the weather is cloudy and even when it's dark? Whilst I am sure that there are military satellites that have 
    very good resolution we are not at the stage where such technology is being used to spy on ordinary people.
    The black cord sensors are traffic sensors however they are only capable of recognising numbers of vehicles 
    (and they have difficulty with light vehicles such as bikes) and are used to control traffic flow, operate lights etc. 
    TVs that can pick up conversation, well any speaker could be used as a microphone albeit not a very good one, 
    the real problem (if you assume such stories to be true) is how would all that data be managed and monitered? 
    It can't be done by computer, they can barely interpret voices when predicted responses are spoken clearly into 
    a microphone. So you are going to have to employ half the population to decipher the banal conversations from 
    the living rooms of the other half, what a great use of resources. Whilst I do not doubt that the government 
    would be more than willing to spy on people that does not mean that every piece of technology is out to get you.
    Now I must get back to designing these GPS autopilots not forgetting the space for the government tracking chip 
     
    of course, oops, now that you all know, the agents should be knocking on your door in a couple of minutes. 
     
    For a little "chat" 
     
    (sorry about the formatting)
  • Caedes
    Caedes

    If all this technology is so readily available it's a wonder that any crime happens at all.

  • tula
    tula
    The black cord sensors are traffic sensors however they are only capable of recognising numbers of vehicles 
    (and they have difficulty with light vehicles such as bikes) and are used to control traffic flow, operate lights etc.

    They have mundane uses, of course. But some of us can see more sinister things to come of this in the future. Like CONTROL and invasion of privacy, and tracking people who may not go along with certain agendas.

    Abstract of corresponding document: WO0169571
    A detection device (100) for detecting the presence of a vehicle with a particular vehicle registration number in a monitored zone is provided. The device includes database storage means(118) for storing a database comprising the vehicle registration number of at least one vehicle which it is desired to detect, image capturing means (102) for capturing an optical image of the monitored zone at least when a vehicle is present in the monitored zone, processing means (116) configured to process the optical image to obtain the captured vehicle registration number and to compare the captured vehicle registration number with vehicle registration numbers in the database, and alarm means (122, 18) for generating an alarm signal if the captured vehicle registration number corresponds with the vehicle registration number of any vehicle in the database which it is desired to detect.

  • ohiocowboy
    ohiocowboy

    read more at http://web.mit.edu/gtmarx/www/softsurveillance.html

    The above link that Tula provided contains some very thought provoking information. Reading that, along with other research will make one realize that such surveillance tactics are already here, and are being used in our everyday lives and activities.

  • tula
    tula
    traffic sensors however they are only capable of recognising numbers of vehicles

    ha! read more:

    http://www.hitachi.com/ICSFiles/afieldfile/2004/06/01/r2000_03_108.pdf

    On page 5 under the subtitle "Conclusions" paragraph 2 notice

    (in reference to future) "construction of an information system that is organically linked with this system"

    It is now a reality.

Share this

Google+
Pinterest
Reddit