Warrantless cell phone tracking in consent that no one reads – Lionel

Source: RT
August 17, 2017

Legal and media analyst Lionel explains how cell phone companies take advantage of their customers who never read the consent form about where the personal information goes, allowing the companies to track the users’ data.

Advertisements

First generation human detection software already being used on the elderly

Image: First generation human detection software already being used on the elderly

Source: NaturalNews.com
Ethan Huff
December 11, 2016

The latest in population control technology is being unveiled in Singapore, where the elderly are now being used as human guinea pigs in a collaborative trial to see how effectively humans can be tracked using wireless sensor technology. According to The Straits Times, two senior studio apartments have already been equipped with the technology, including the installation of seven small sensors strategically placed throughout the premises that actively monitor the whereabouts of the seniors who live there.

Every time Madam Ng Siew Eng, one of the participating elderly patients, leaves her house, her caretakers and family members are able to track her whereabouts thanks to a special device attached to her house keys. This device communicates remotely with a server that keeps tabs on her every move, that way if someone is needing to find her they can do so in real time, should an unexpected emergency occur.

While in her home, Madam Ng can also be monitored by the small devices attached to the walls of her living room, bedroom, bathroom, and kitchen. As she roams about her home, these devices communicate with the third party server to make sure she hasn’t fallen, for instance, or isn’t having trouble breathing. The system is even capable of monitoring her sleeping patterns.

Madam Ng’s apartment is one of two in the area that’s being preliminarily tested as part of a six-month trial being conducted by Adventist Home for the Elders and a local technology startup known as ConnectedLife. If successful – which by all indications so far, those in participation are favorable towards it – the technology could see greater expansion in the coming months and years.

“Before, I was worried I might pass out and nobody would know,” Madam Ng told the paper. “Now, with this emergency button, I’m very happy.”

Human monitoring has its benefits, but is it just more ‘Big Brother’ in our lives?

The technology is equipped with various “smart” elements as well that can detect unusual behavioral patterns that might indicate a person is injured or even dead. Spending too much time in the bathroom, for instance – “too much time” being inordinate amounts that break typical patterns – would trigger a call to a local family member or caregiver, who would know to come and check on the individual.

Tracking systems such as this one also allow seniors more freedom, advocates claim, giving them greater confidence to go more places without worrying that they might get lost or hurt. And their loved ones are then faced with less worry about what might happen out of eyeshot or earshot, a win-win for seniors in terms of prolonged independence during their latter years.

Josephine Teo, Senior Minister of State at the Prime Minister’s Office, believes the technology is a wonder for seniors, and that it provides everyone involved greater peace of mind – which it definitely does. But such technology isn’t without its fair share of privacy concerns, as having a constant “eye” inside the home and on one’s person 24 hours a day leaves the door open for more government invasion into our lives.

“That’s the scariest part of this [trend] – the potential for Big Brother,” Rich Redelfs, a general partner at Foundation Capital, a wireless technologies venture capital firm, said to Computer World. “Privacy is ultimately a moral issue, and that matters to us. The Internet as a whole has raised the issue for how much of our personal information might be seen by others.”

“I’d say the biggest worry is the growing use of wireless video cameras in traffic.”

Read More At: NaturalNews.com

Sources:

StraitsTimes.com

ComputerWorld.com

Yahoo gets 500M users hacked, patents tech to gather more user data

Source: RT
November 2, 2016

Yahoo just got caught handing over user email and data to the FBI. They’ve also had their user data hacked. Now, the company wants to build more spy technology – billboards to track every single driver.

Big Brother Du Jour: Australia has become the first country to microchip its citizens

Microchip

Source: NaturalNews.com
J.D. Heyes
October 14, 2016

You may not have noticed, but there are two kinds of countries in the world these days: Dictatorships led by authoritarians and democracies that are slowly being taken over by authoritarians. Put Australia into the latter.

Organic & Healthy reports that the land Down Under has become the first nation to begin microchipping its citizens, though NBC News predicted some years ago that, by 2017, Americans would all be microchipped.

Australia’s drive to implant citizens with what many believe is the Biblical “mark of the beast” is “a clever propaganda campaign that equates RFID microchipping with becoming superhuman, and people are begging for it,” News.com.au noted.

It’s all about ‘convenience’

One Australian woman, Shanti Korporaal, from Sydney, is at the center of a controversy after having implants inserted in both hands. “You could set up your life so you never have to worry about any passwords or PINs,” she told News.com.au.

The idea is that microchip implants give you a unique identifier, so your implant can be used to get into locked doors, transfer personal information to smart phones and other personal devices – and, of course, allow you to be tracked everywhere you go by government.

Why would anyone voluntarily want to do that? One word, says one microchipping recipient: “Convenience.”

As bad as it is to carry cards around that transfer personal and financial data to massive (hackable) databases and smartphones that serve as personal tracking devices – again, out of convenience – you at least have the option (for now) of leaving them behind when you go somewhere.

You don’t have to take a smartphone with you, or at minimum you can learn some ways to better protect your information. With cards, if you must carry them, there are devices you can use to essentially shield them from ID thieves and tracking devices.

But once you put a tracking device under your skin, the only way to get rid of it is to have it surgically removed, or hack off your limb.

Would authorities actually track you for no reason? It’s already being done.

As we reported in April 2012 that police departments were tracking cell phones without first getting a warrant, as required by the Fourth Amendment to the Constitution. In fact, the American Civil Liberties Union found that “many” of nearly 200 departments surveyed did so sans warrant. While some departments were getting the required warrant first, others “said they use varying legal standards, such as a warrant or a less-strict subpoena.”

Why make it easier to track you?

The practice has continued. In July the Boston Globe reported that the city’s police department had used “a controversial cellphone technology 11 times over the past seven years without once obtaining a search warrant…”

Another major problem is hacking and identity theft. In the NBC News report of several years ago, reporters noted that one of the “problems” that could be solved had to do with medical information: Chips would allow doctors and hospitals to have access to your identity and medical record if you were unconscious and unaccompanied upon admission (and how often does that happen?). But medical information is a top target of hackers and identity thieves. In fact, health care information is the most coveted by cyber thieves because data contained in health records – prescriptions, Social Security numbers, addresses, etc. – are much more permanent than, say, financial data (which is changed once a hack has been detected).

Privacy in a digital world comes at a premium as it is. Our retinas are scanned, our wallets are scanned, our online data is hacked and our movements are already being tracked – both by government and by private corporations. But all of those methods can be mitigated. It’s very difficult to mitigate personal tracking when you’re carrying the tracker inside your body.

The point is, if government can track you 24/7/365, government can control you as well.

Read More At: NaturalNews.com

Sources:

OrganicAndHealth.org

News.com.au

Wired.com

NaturalNews.com

BostonGlobe.com

InfoWorld.com

[Book Review] – Drilling Through The Core – Why Common Core Is Bad For American Education By Sandra Stotsky & Contributors

CommonCore
TheBreakaway
Zy Marquiez
June 15, 2016

There are countless books out there on Common Core.  Many of them are rather well done.

However, out of all the books available, this one resonated with me rather well.

Drilling Through The Core, does an exceptional job of detailing both sides of the Common Core issue.

The book’s impartial approach to bring objective analysis to Common Core is something to be highly regarded due to the impeccable way in which the authors/contributors went about in highlighting the disaster that Common Core is becoming.

Carrying out a true nuts and bolt approach, the authors/contributors detail varying components which showcase that Common Core is picking up where the national disaster of No Child Left Behind [NCLB] left of.  And that’s not an understatement either.

There is a reason NCLB has gotten a bad reputation, and its because it doesn’t work.  Countless people/data have shown this to be the case, which ironically is the very reason many are arguing for Common Core.

Along with that troublesome point, the data mining of our children for corporations is also a noteworthy issue to consider.  After all, one thing is information being used for our children’s benefits.  Something else entirely is the information gathered being used for corporate benefits, which of course is what corporations such as the Gates Foundation aim to accomplish.  In the age of mass surveillance/spying and data mining, it’s not surprising that such is the case.

Another nefarious component that’s addressed in the book is the connection Bill Gates and his foundation have.  The unprecedented power that The Bill & Melinda Gates Foundation has had in helping manipulate what takes place with Common Core is downright disturbing.

If that were not enough, the way in which teaching of history is going to take place totally eviscerates the whole point of teaching it in the first place.  And that’s quite noteworthy, because without a solid foundation in history, an individual will not know the context of what is currently taking place, which is priceless.

Delving into what the comptrollers wish to accomplish in math, the executive director of Eagle Form, Glyn Write, notes:

“The math standard focuses on investigative math, which has been shown to be a disaster…With the new math standard in the Common Core, there are no longer absolute truths. So 3 times 4 can equal 11 so long as a student can effectively explain how they reached that answer.”  [P1]

If that doesn’t leave one’s mind spinning, nothing will.

Furthermore, as a contributor notes:

The Common Core emphasizes teaching students to think of what they learn as “evidence” that can be put to use in making “arguments” as opposed to “facts” that help the student discern how things are.  For the most part, the Common Core steers away from giving students a concrete picture of the world.” [2]

To think, the above are just snippets of the countless issues future generations will face.

If we don’t protect the right for individuals to have a robust and well-rounded education, who will?

We already have some examples of what works, as the book elucidates.  Why not use them?

The future will ultimately rest on how our nation is educated.  It will be up to individuals taking control of their own education, or letting others with nefarious interests do it for profit and control.

Time, and the individual, will tell.

________________________________________________________________________
Sources & References:

[1] Sandra Stotsky, Drilling Through The Core, pg. 48
[2] Ibid., pg. 35