Mass surveillance is the Deep State’s version of a “gift” that keeps on giving…back to the Deep State.
Geofencing dragnets. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Drones. Contact tracing apps. License plate readers. Social media vetting. Surveillance towers.
What these add up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.
Big Tech wedded to Big Government has become Big Brother.
Every second of every day, the American people are being spied on by a vast network of digital Peeping Toms, electronic eavesdroppers and robotic snoops.
This creepy new era of government/corporate spying—in which we’re being listened to, watched, tracked, followed, mapped, bought, sold and targeted—has been made possible by a global army of techno-tyrants, fusion centers and Peeping Toms.
Consider just a small sampling of the tools being used to track our movements, monitor our spending, and sniff out all the ways in which our thoughts, actions and social circles might land us on the government’s naughty list, whether or not you’ve done anything wrong.
Tracking you based on your phone and movements: Cell phones have become de facto snitches, offering up a steady stream of digital location data on users’ movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices (and their owners) in a 4-acre area around the Capitol on January 6. This latest surveillance tactic could land you in jail for being in the “wrong place and time.” Police are also using cell-site simulators to carry out mass surveillance of protests without the need for a warrant. Moreover, federal agents can now employ a number of hacking methods in order to gain access to your computer activities and “see” whatever you’re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.
1 comment:
Snitch tip lines reminds me of the past and present. Past - Hitler youth snitching on their parents. The same for Mao's red guards. Future - a recycled American Bund devoted to 666 and his NWO.
Post a Comment