Government & Computer Manufacturers Caught Installing Hardwired Keystroke Loggers into all new Laptops
Sadly, this is nothing new or surprising. The government has been caught time and time again secretly colluding with industry to force people into their control mechanisms against their will and without their knowledge. No one wanted a to have their inspection sticker RFID tagged so that their vehicle could be tracked, but they rolled out the legislation anyway. We beat it once, but no doubt it will be back. No body wanted to pay extra for an automobile black box to monitor their every automotive move, but the auto industry is doing it anyway. And certainly no one wanted to have the government track their cell phone and spy on them, but never the less, it was done and in complete secrecy. They are aware that we can easily see through their schemes so they have to hide them. No longer can they simply invoke "safety" and have the population gladly accept the invitation to their track and control prison. Now they just do it and hope no one notices.
Turner Radio Network
Devices capture everything you ever type, then can send it via your ethernet card to the Dept. of Homeland Security without your knowledge, consent or a search warrant each time you log onto the internet!
Freedom Of Information Act Requests For Explanation From DHS, refused.
I was opening up my almost brand new laptop, to replace a broken PCMCIA slot riser on the motherboard. As soon as I got the keyboard off, I noticed a small cable running from the keyboard connection underneath a piece of metal protecting the motherboard.
I figured "No Big Deal", and continued with the dissasembly. But when I got the metal panels off, I saw a small white heatshink-wrapped package. Being ever-curious, I sliced the heatshrink open. I found a little circuit board inside.
Being an EE by trade, this piqued my curiosity considerably. On one side of the board, one Atmel AT45D041A four megabit Flash memory chip.
On the other side, one Microchip Technology PIC16F876 Programmable Interrupt Controller, along with a little Fairchild Semiconductor CD4066BCM quad bilateral switch.
Looking further, I saw that the other end of the cable was connected to the integrated ethernet board.
What could this mean? I called the manufacturer's tech support about it, and they said, and I quote, "The intregrated service tag identifier is there for assisting customers in the event of lost or misplaced personal information." He then hung up.
A little more research, and I found that that board spliced in between the keyboard and the ethernet chip is little more than a Keyghost hardware keylogger.The reasons a computer manufacturer would put this in their laptops can only be left up to your imagination. It would be very impractical to hand-anylze the logs, and very CPU-intensive to do so on a computer for every person that purchased a laptop. Why are these keyloggers here? I recently almost found out.
I called the police, as having a keylogger unknown to me in my laptop is a serious offense. They told me to call the Department of Homeland Security. At this point, I am in disbelief. Why would the DHS have a keylogger in my laptop? It was surreal.
So I called them, and they told me to submit a Freedom of Information Act request. This is what I got back:
Under the Freedom Of Information Act (FOIA) the only items exempt from public disclosure are items relating to "law enforcement tools and techniques" and "items relating to national security."
The real life implications of this are plain: Computer manufacturers appear to be cooperating with the Department of Homeland Security to make every person who buys a new computer subject to immediate, unrestricted government recording of everything they do on those computers! EVERYTHING!
This information can be sent to DHS, online, without your knowledge or consent, without a search warrant or even probable cause! That's why this device is hard-wired directly into the ethernet card, which communicates over the internet!
I am not certain how long this information will be permitted to remain online for all the world to see before the government takes some type of action to attempt to have it removed from public view. I URGE you to take copy of this page immediately and spread this information to everyone you know immediately! The more people who find out about this, the more can protect themselves and raise a HUGE outcry to force government and computer manufacturers to immediately CEASE installing these devices in new computers!
High-tech totalitarianism is on its way
by Kevin Haggerty, Toronto Star Dec. 10, 2006
By the time my four-year-old son is swathed in the soft flesh of old age, he will likely find it unremarkable that he and almost everyone he knows will be permanently implanted with a microchip. Automatically tracking his location in real time, it will connect him with databases monitoring and recording his smallest behavioral traits.
Most people anticipate such a prospect with a sense of horrified disbelief, dismissing it as a science-fiction fantasy. The technology, however, already exists. For years humane societies have implanted all the pets that leave their premises with a small identifying microchip. As well, millions of consumer goods are now traced with tiny radio frequency identification chips that allow satellites to reveal their exact location.
A select group of people are already "chipped" with devices that automatically open doors, turn on lights, and perform other low-level miracles.
What might Hitler, Mao or Milosevic have accomplished if their citizens were chipped, coded, and remotely monitored?
Filed under:
The war on freedom
Prominent among such individuals is researcher Kevin Warwick of Reading University in England; Warwick is a leading proponent of the almost limitless potential uses for such chips.
Other users include the patrons of the Baja Beach Club in Barcelona, many of whom have paid about $150 (U.S.) for the privilege of being implanted with an identifying chip that allows them to bypass lengthy club queues and purchase drinks by being scanned. These individuals are the advance guard of an effort to expand the technology as widely as possible.
From this point forward, microchips will become progressively smaller, less invasive, and easier to deploy. Thus, any realistic barrier to the wholesale "chipping" of Western citizens is not technological but cultural. It relies upon the visceral reaction against the prospect of being personally marked as one component in a massive human inventory.
Today we might strongly hold such beliefs, but sensibilities can, and probably will, change. How this remarkable attitudinal transformation is likely to occur is clear to anyone who has paid attention to privacy issues over the past quarter-century. There will be no 3 a.m. knock on the door by storm troopers come to force implants into our bodies. The process will be more subtle and cumulative, couched in the unassailable language of progress and social betterment, and mimicking many of the processes that have contributed to the expansion of closed-circuit television cameras and the corporate market in personal data.
A series of tried and tested strategies will be marshaled to familiarize citizens with the technology. These will be coupled with efforts to pressure tainted social groups and entice the remainder of the population into being chipped.
This, then, is how the next generation will come to be microchipped.
It starts in distant countries. Having tested the technology on guinea pigs, both human and animal, the first widespread use of human implanting will occur in nations at the periphery of the Western world. Such developments are important in their own right, but their international significance pertains to how they familiarize a global audience with the technology and habituate them to the idea that chipping represents a potential future.
An increasing array of hypothetical chipping scenarios will also be depicted in entertainment media, furthering the familiarization process.
In the West, chips will first be implanted in members of stigmatized groups. Pedophiles are the leading candidate for this distinction, although it could start with terrorists, drug dealers, or whatever happens to be that year's most vilified criminals. Short-lived promises will be made that the technology will only be used on the "worst of the worst." In fact, the wholesale chipping of incarcerated individuals will quickly ensue, encompassing people on probation and on parole.
Even accused individuals will be tagged, a measure justified on the grounds that it would stop them from fleeing justice. Many prisoners will welcome this development, since only chipped inmates will be eligible for parole, weekend release, or community sentences. From the prison system will emerge an evocative vocabulary distinguishing chippers from non-chippers.
Although the chips will be justified as a way to reduce fraud and other crimes, criminals will almost immediately develop techniques to simulate other people's chip codes and manipulate their data.
The comparatively small size of the incarcerated population, however, means that prisons would be simply a brief stopover on a longer voyage. Commercial success is contingent on making serious inroads into tagging the larger population of law-abiding citizens. Other stigmatized groups will therefore be targeted. This will undoubtedly entail monitoring welfare recipients, a move justified to reduce fraud, enhance efficiency, and ensure that the poor do not receive "undeserved" benefits.
Once e-commerce is sufficiently advanced, welfare recipients will receive their benefits as electronic vouchers stored on their microchips, a policy that will be tinged with a sense of righteousness, as it will help ensure that clients can only purchase government-approved goods from select merchants, reducing the always disconcerting prospect that poor people might use their limited funds to purchase alcohol or tobacco.
Civil libertarians will try to foster a debate on these developments. Their attempts to prohibit chipping will be handicapped by the inherent difficulty in animating public sympathy for criminals and welfare recipients -- groups that many citizens are only too happy to see subjected to tighter regulation. Indeed, the lesser public concern for such groups is an inherent part of the unarticulated rationale for why coerced chipping will be disproportionately directed at the stigmatized.
The official privacy arm of the government will now take up the issue. Mandated to determine the legality of such initiatives, privacy commissioners and Senate Committees will produce a forest of reports presented at an archipelago of international conferences. Hampered by lengthy research and publication timelines, their findings will be delivered long after the widespread adoption of chipping is effectively a fait accompli. The research conclusions on the effectiveness of such technologies will be mixed and open to interpretation.
Officials will vociferously reassure the chipping industry that they do not oppose chipping itself, which has fast become a growing commercial sector. Instead, they are simply seeking to ensure that the technology is used fairly and that data on the chips is not misused. New policies will be drafted.
Employers will start to expect implants as a condition of getting a job. The U.S. military will lead the way, requiring chips for all soldiers as a means to enhance battlefield command and control -- and to identify human remains. From cooks to commandos, every one of the more than one million U.S. military personnel will see microchips replace their dog tags.
Following quickly behind will be the massive security sector. Security guards, police officers, and correctional workers will all be expected to have a chip. Individuals with sensitive jobs will find themselves in the same position.
The first signs of this stage are already apparent. In 2004, the Mexican attorney general's office started implanting employees to restrict access to secure areas. The category of "sensitive occupation" will be expansive to the point that anyone with a job that requires keys, a password, security clearance, or identification badge will have those replaced by a chip.
Judges hearing cases on the constitutionality of these measures will conclude that chipping policies are within legal limits. The thin veneer of "voluntariness" coating many of these programs will allow the judiciary to maintain that individuals are not being coerced into using the technology.
In situations where the chips are clearly forced on people, the judgments will deem them to be undeniable infringements of the right to privacy. However, they will then invoke the nebulous and historically shifting standard of "reasonableness" to pronounce coerced chipping a reasonable infringement on privacy rights in a context of demands for governmental efficiency and the pressing need to enhance security in light of the still ongoing wars on terror, drugs, and crime.
At this juncture, an unfortunately common tragedy of modern life will occur: A small child, likely a photogenic toddler, will be murdered or horrifically abused. It will happen in one of the media capitals of the Western world, thereby ensuring non-stop breathless coverage. Chip manufactures will recognize this as the opportunity they have been anticipating for years. With their technology now largely bug-free, familiar to most citizens and comparatively inexpensive, manufacturers will partner with the police to launch a high-profile campaign encouraging parents to implant their children "to ensure your own peace of mind."
Special deals will be offered. Implants will be free, providing the family registers for monitoring services. Loving but unnerved parents will be reassured by the ability to integrate tagging with other functions on their PDA so they can see their child any time from any place.
Paralleling these developments will be initiatives that employ the logic of convenience to entice the increasingly small group of holdouts to embrace the now common practice of being tagged. At first, such convenience tagging will be reserved for the highest echelon of Western society, allowing the elite to move unencumbered through the physical and informational corridors of power. Such practices will spread more widely as the benefits of being chipped become more prosaic. Chipped individuals will, for example, move more rapidly through customs.
Indeed, it will ultimately become a condition of using mass-transit systems that officials be allowed to monitor your chip. Companies will offer discounts to individuals who pay by using funds stored on their embedded chip, on the small-print condition that the merchant can access large swaths of their personal data. These "discounts" are effectively punitive pricing schemes, charging un-chipped individuals more as a way to encourage them to submit to monitoring. Corporations will seek out the personal data in hopes of producing ever more fine-grained customer profiles for marketing purposes, and to sell to other institutions.
By this point all major organizations will be looking for opportunities to capitalize on the possibilities inherent in an almost universally chipped population. The uses of chips proliferate, as do the types of discounts. Each new generation of household technology becomes configured to operate by interacting with a person's chip.
Finding a computer or appliance that will run though old-fashioned "hands-on"' interactions becomes progressively more difficult and costly. Patients in hospitals and community care will be routinely chipped, allowing medical staff -- or, more accurately, remote computers -- to monitor their biological systems in real time.
Eager to reduce the health costs associated with a largely docile citizenry, authorities will provide tax incentives to individuals who exercise regularly. Personal chips will be remotely monitored to ensure that their heart rate is consistent with an exercise regime.
By now, the actual process of "chipping" for many individuals will simply involve activating certain functions of their existing chip. Any prospect of removing the chip will become increasingly untenable, as having a chip will be a precondition for engaging in the main dynamics of modern life, such as shopping, voting, and driving.
The remaining holdouts will grow increasingly weary of Luddite jokes and subtle accusations that they have something to hide. Exasperated at repeatedly watching neighbors bypass them in "chipped" lines while they remain subject to the delays, inconveniences, and costs reserved for the un-chipped, they too will choose the path of least resistance and get an implant.
In one generation, then, the cultural distaste many might see as an innate reaction to the prospect of having our bodies marked like those of an inmate in a concentration camp will likely fade.
In the coming years some of the most powerful institutional actors in society will start to align themselves to entice, coerce, and occasionally compel the next generation to get an implant.
Now, therefore, is the time to contemplate the unprecedented dangers of this scenario. The most serious of these concern how even comparatively stable modern societies will, in times of fear, embrace treacherous promises. How would the prejudices of a Joe McCarthy, J. Edgar Hoover, or of southern Klansmen -- all of whom were deeply integrated into the American political establishment -- have manifest themselves in such a world? What might Hitler, Mao or Milosevic have accomplished if their citizens were chipped, coded, and remotely monitored?
Choirs of testimonials will soon start to sing the virtues of implants. Calm reassurances will be forthcoming about democratic traditions, the rule of law, and privacy rights. History, unfortunately, shows that things can go disastrously wrong, and that this happens with disconcerting regularity. Little in the way of international agreements, legality, or democratic sensibilities has proved capable of thwarting single-minded ruthlessness.
"It can't happen here" has become the whispered swan song of the disappeared.
Best to contemplate these dystopian potentials before we proffer the tender forearms of our sons and daughters. While we cannot anticipate all of the positive advantages that might be derived from this technology, the negative prospects are almost too terrifying to contemplate.
US plans massive data sweep
The Christian Science Monitor
By Mark Clayton
The US government is developing a massive computer system that can collect huge amounts of data and, by linking far-flung information from blogs and e-mail to government records and intelligence reports, search for patterns of terrorist activity.
The system - parts of which are operational, parts of which are still under development - is already credited with helping to foil some plots. It is the federal government's latest attempt to use broad data-collection and powerful analysis in the fight against terrorism. But by delving deeply into the digital minutiae of American life, the program is also raising concerns that the government is intruding too deeply into citizens' privacy.
"We don't realize that, as we live our lives and make little choices, like buying groceries, buying on Amazon, Googling, we're leaving traces everywhere," says Lee Tien, a staff attorney with the Electronic Frontier Foundation. "We have an attitude that no one will connect all those dots. But these programs are about connecting those dots - analyzing and aggregating them - in a way that we haven't thought about. It's one of the underlying fundamental issues we have yet to come to grips with."
The core of this effort is a little-known system called Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement (ADVISE). Only a few public documents mention it. ADVISE is a research and development program within the Department of Homeland Security (DHS), part of its three-year-old "Threat and Vulnerability, Testing and Assessment" portfolio. The TVTA received nearly $50 million in federal funding this year.
DHS officials are circumspect when talking about ADVISE. "I've heard of it," says Peter Sand, director of privacy technology. "I don't know the actual status right now. But if it's a system that's been discussed, then it's something we're involved in at some level."
Data-mining is a key technology
A major part of ADVISE involves data-mining - or "dataveillance," as some call it. It means sifting through data to look for patterns. If a supermarket finds that customers who buy cider also tend to buy fresh-baked bread, it might group the two together. To prevent fraud, credit-card issuers use data-mining to look for patterns of suspicious activity.
What sets ADVISE apart is its scope. It would collect a vast array of corporate and public online information - from financial records to CNN news stories - and cross-reference it against US intelligence and law-enforcement records. The system would then store it as "entities" - linked data about people, places, things, organizations, and events, according to a report summarizing a 2004 DHS conference in Alexandria, Va. The storage requirements alone are huge - enough to retain information about 1 quadrillion entities, the report estimated. If each entity were a penny, they would collectively form a cube a half-mile high - roughly double the height of the Empire State Building.
But ADVISE and related DHS technologies aim to do much more, according to Joseph Kielman, manager of the TVTA portfolio. The key is not merely to identify terrorists, or sift for key words, but to identify critical patterns in data that illumine their motives and intentions, he wrote in a presentation at a November conference in Richland, Wash.
For example: Is a burst of Internet traffic between a few people the plotting of terrorists, or just bloggers arguing? ADVISE algorithms would try to determine that before flagging the data pattern for a human analyst's review.
At least a few pieces of ADVISE are already operational. Consider Starlight, which along with other "visualization" software tools can give human analysts a graphical view of data. Viewing data in this way could reveal patterns not obvious in text or number form. Understanding the relationships among people, organizations, places, and things - using social-behavior analysis and other techniques - is essential to going beyond mere data-mining to comprehensive "knowledge discovery in databases," Dr. Kielman wrote in his November report. He declined to be interviewed for this article.
Starlight has already helped foil some terror plots, says Jim Thomas, one of its developers and director of the government's new National Visualization Analytics Center in Richland, Wash. He can't elaborate because the cases are classified, he adds. But "there's no question that the technology we've invented here at the lab has been used to protect our freedoms - and that's pretty cool."
As envisioned, ADVISE and its analytical tools would be used by other agencies to look for terrorists. "All federal, state, local and private-sector security entities will be able to share and collaborate in real time with distributed data warehouses that will provide full support for analysis and action" for the ADVISE system, says the 2004 workshop report.
A program in the shadows
Yet the scope of ADVISE - its stage of development, cost, and most other details - is so obscure that critics say it poses a major privacy challenge.
"We just don't know enough about this technology, how it works, or what it is used for," says Marcia Hofmann of the Electronic Privacy Information Center in Washington. "It matters to a lot of people that these programs and software exist. We don't really know to what extent the government is mining personal data."
Even congressmen with direct oversight of DHS, who favor data mining, say they don't know enough about the program.
"I am not fully briefed on ADVISE," wrote Rep. Curt Weldon (R) of Pennsylvania, vice chairman of the House Homeland Security Committee, in an e-mail. "I'll get briefed this week."
Privacy concerns have torpedoed federal data-mining efforts in the past. In 2002, news reports revealed that the Defense Department was working on Total Information Awareness, a project aimed at collecting and sifting vast amounts of personal and government data for clues to terrorism. An uproar caused Congress to cancel the TIA program a year later.
Echoes of a past controversial plan
ADVISE "looks very much like TIA," Mr. Tien of the Electronic Frontier Foundation writes in an e-mail. "There's the same emphasis on broad collection and pattern analysis."
But Mr. Sand, the DHS official, emphasizes that privacy protection would be built-in. "Before a system leaves the department there's been a privacy review.... That's our focus."
Some computer scientists support the concepts behind ADVISE.
"This sort of technology does protect against a real threat," says Jeffrey Ullman, professor emeritus of computer science at Stanford University. "If a computer suspects me of being a terrorist, but just says maybe an analyst should look at it ... well, that's no big deal. This is the type of thing we need to be willing to do, to give up a certain amount of privacy."
Others are less sure.
"It isn't a bad idea, but you have to do it in a way that demonstrates its utility - and with provable privacy protection," says Latanya Sweeney, founder of the Data Privacy Laboratory at Carnegie Mellon University. But since speaking on privacy at the 2004 DHS workshop, she now doubts the department is building privacy into ADVISE. "At this point, ADVISE has no funding for privacy technology."
She cites a recent request for proposal by the Office of Naval Research on behalf of DHS. Although it doesn't mention ADVISE by name, the proposal outlines data-technology research that meshes closely with technology cited in ADVISE documents.
Neither the proposal - nor any other she has seen - provides any funding for provable privacy technology, she adds.
Big Brother can use printer to track you
Washington Post
By Mike Musgrove
WASHINGTON - It sounds like a conspiracy theory, but it isn’t. The pages coming out of your color printer may contain hidden information that could be used to track you down if you ever cross the U.S. government.
Last year, an article in PC World magazine pointed out that printouts from many color laser printers contained yellow dots scattered across the page, viewable only with a special kind of flashlight.
The article quoted a senior researcher at Xerox Corp. saying that the dots contain information useful to law-enforcement authorities, a secret digital “license tag” for tracking down criminals.
The content of the coded information was supposed to be a secret, available only to agencies looking for counterfeiters who use color printers.
Now, the secret is out.
Tuesday, the Electronic Frontier Foundation, a San Francisco consumer privacy group, said it had cracked the code used in a widely used line of Xerox printers, an invisible bar code of sorts that contains the serial number of the printer as well as the date and time a document was printed.
With the Xerox printers, the information appears as a pattern of yellow dots, each only a millimeter wide and visible only with a magnifying glass and a blue light.
The EFF said it has identified similar coding on pages printed from nearly every major printer manufacturer, including Hewlett-Packard Co., though its team has so far cracked the codes for only one type of Xerox printer.
The U.S. Secret Service acknowledged yesterday that the markings, which are not visible to the human eye, are there, but it played down the use for invading privacy.
“It’s strictly a countermeasure to prevent illegal activity specific to counterfeiting,” agency spokesman Eric Zahren said. “It’s to protect our currency and to protect people’s hard-earned money.”
It’s unclear whether the yellow-dot codes have ever been used to make an arrest. And no one would say how long the codes have been in use.
But Seth Schoen, the EFF technologist who led the organization’s research, said he had seen the coding on documents produced by printers that were at least 10 years old.
“It seems like someone in the government has managed to have a lot of influence in printing technology,” he said.
Xerox spokesman Bill McKee confirmed the existence of the hidden codes, but he said the company was simply assisting an agency that asked for help.
“It’s disturbing that something on this scale, with so many privacy implications, happened with such a tiny amount of publicity,” Schoen said.
And it’s not as if the information is encrypted in a highly secure fashion, Schoen said. “We were able to break this code very rapidly.”
Welcome to the Cashless Society Control Grid
From embedded microchips to RFID tracking, the cashless society roll out is going on in full force.
With children thumbscanning to get their lunches and amusement park goers biometrically scanning for entry, we are being trained to use our biometric signatures as payment and identification.
Trendy clubs around the globe have begun to surgically implant their VIP customers with microchips that they can use to pay for their bar tabs, making it "cool" to "get chipped." Now these "hip" and "elite" customers won't have to bring their wallet out with them to have a good time.
Soon RFID tags will be in everything from pharmaceuticals to clothing. Exclusive clothiers are already using the tags to recognize customers as they walk in the door from what they are wearing.
This is a global system. Our passports will now be biometric, the information stored on an RFID chip. National id legislation has been passed with the same big brother technology onboard.
With cameras (most biometric) already on almost every street corner and the ongoing media hurrah for all this "wonderful" technology that can "protect us" and "make life easier" ask yourself what is this all for?
The globalists are setting up the beast system so there is nowhere to hide. Cash itself will be traceable, so one day every transaction you make will be identifiable. You will always be on camera and big brother will always know where you are and what you do.
This section is just a small cross section of the thousands of articles that we have come across related to the cashless society. Welcome to the cashless society. Welcome to the New World Order.
2 comments:
Spot on!
Shame I'm only getting to read this 5 years after. Thank you egoigwe for this treasure of information.
Post a Comment