Integrity Sweep Amsterdam:
Information from all over Amsterdam entering unfiltered into: Contra Terrorisme Box
in a combined effort of: KLPD, Politie and AIVD together in order to follow all regarded dangerous: persons and organisations
motivated by the killing of "Theo van Gogh"
Amsterdams Stadsblad, Wednesday 23 March 05, Politie speurt met AIVD naar Terreur.
Volkskrant, Friday 18 March 05, Megafusie dagbladen kost zeker 325 banen.
Made some diagrams on how some of the AIVD tactics work: harrasment / stalking / provocation
+--+ +->| | Observation & Harrasment | +--+ monitoring, provocation, | || intimidation, manipulations | \/ | +--+ +--| | Manipulation of life chances +--+ losing: friends, work, accomodation, ^ || opportunities & | || finding new: "friends", "work", | || "accomodation" and "opportunities" | \/ | +--+ +--| | Gotcha, landed into created situation +--+ you find yourself in serious trouble, ^ || ready for chantage, blackmail and the like. | || Your "friends" / witnesses loyalty works against you. | \/ | +--+ +--| | Offer +--+ tell us all about ... work for us, do ... ^ || | \/ | +--+ +--| | Tool +--+ you have become a puppet for further development into mainly these directions: 1 agent provocateur: terrorist, criminal, liquidator 2 scene infiltrator: drugs, politics, IT, media, finance, Hells Angels, Kurds, etc.
on the issue of: Dutch Integrity Scan by Systematic Stalking
.====. // \\ || || || \/ || 0 <----- Fresh personnel in (X) || || || \/ || 0 ------ Crisis or Threat of some kind || || || \/ || 0 ------ Harassment & Confusion || || - help subject (Tamagotchi) a little || || - talk Sympathetic /\ || || \/ || 0 ------ Watch for Sympathizers || || || \/ || 0 ------ Filter || ||\ || || '----> symphathizers out (Y) || || \ || || '--> excess personel out \\ // .=====.PRIVACY INVADERS
Monitoring is mostly done by loading the visible system ontop of a invisible system (kernel) that resides in a single chip. This system on a chip can be located on a memory module or in the BIOS itself. Thus becoming almost undetectable. From here all keystrokes can be logged (keylogger) and the data securely transmitted over a VPN or stored in memory. Operations like formatting are circumvented by having the BIOS move the data around while formatting is in process.
Therefore I recommend using a public computer at some internet cafe but leave your mobile home or pull the battery first long before you start looking for the shop. And of course you will never combine your private- with the secure- work, not in this sessio not in this cafe not today. KEEP iT SEPERATE AT ALL TIME!!!.
Cash is cash, but with electronic money so much data is gathered for commercial purposes that your privacy is very surely at risk. As an exampe I will describe what is done when you pay electronically at a candy vending machine: The owners / operators have an interest to manage the cost of operating their machines. Therefore they keep a database of all machines and all transactions. Data collection is cheap enough but managing all this data and transforming it into usefull data is difficult and an expensive bussiness. So that will be outsourced to specialised companies that are dealing with many more data gathering and data transformation applications like these. How convenient for the security of the state... The question, how do I earn the most money from my machine breaks down to the following questions:
what is the optimal productmix for my machine at location PQZ99864r54
And the question how do I decrease my operational cost to:
what is the optimal filling frequency (maintenance cost)
what is the optimal location for this type of machine
So many factors influence the operation of a simple candy machine. A database is kept on the machine, in a compressed digital format ID';s are kept that uniquely identify: date, time, product and chipcard. Useally the following files are kept:
sales(product-ID,date-time of purchase,card-ID)
inventory(product-ID,number of products,date-time of filling)
productprice(product-ID,price,date of pricesetting)
In fact we don't need to keep the prices or totalls in this database as this is defined by the product-ID and the date of purchase, so pricechanges are no hassle on the machine and the file productprice does not need to be kept on the machine itself. By combining and sorting these figures in different formats all sorts of questions can be asked. Like what is the optimal product mix for a machine in the summer. This means we want to see the highest possible frequency in transactions for products with the best margin between april and september - a matter of combining, sorting and counting. The salestable is combined with the productprice table to turn the sold product frequency into a monetary unit. The optimum is found by finding the highest margins on the totals, where additional costs from operating the machine i.e. filling frequency, cleaning, protection, etc has to be taken into account as well. So the answer to this kind of questions is not so easy, a lot of data is neaded and the effect and relation to other seasonal and commercial factors needs to be established aswell.
Before, price management was related to coin availability, leading to ":easy" prices, better 40 ct. than 37 or 42 ct. But with e-money these prices can be handled, ofcourse a price is not only a economical matter but also psychological and that is the reason why we haven't seen 37 ct. yet on a Dutch vendingmachine, but in theory the price of candy could be exsactly set to a calculated optimum.
The keeping of chipcard-ID's is obvious as chipcard costs needs to be balanced too, like what is the best chipcard for us, the cost per unit, lifecyclemanagement, "extra" functions, promotional activities, customer relation management and fraud. Fraud is almost zero as nobody knows yet how to manipulate a chipcard.
At the datamining company that is specialised in this sort of problems a lot of data from all sorts of applications comes together. Not only vending machines but public transport, factory inventories and insurance data etc. So a very sophisticated user profile can be established, very much along the same procedure as finding a optimal productmix. Of course they will need to link the data from all these applications together and thats where all these (chip, ATM, loyalty, etc) card-ID's kicks in.
Customer relation management is the real privacy intruder. Why not combining your customer relation package with a GIS, a Geografical Information System. If the bank knows that you are paying most of your parking tickets near hotels and restaurants a mailing on travel insurance, hotel vouchers or a special parking pass may be on your way. This makes economically a lot of sense.
It all comes together at the Data Mining company:
Buying groceries with your loyalty / chip-card tells us your feeding habits. And more, it links your chipcard-ID to the fatctory inventory database, so the soupfactory could send you a letter for a product recall. Or make the tax man suspicious, because you buy caviar all the time while you are on the dole (Social Benevit). The insurance company may think that you are lying to them about your drinking smoking or cholesterol whatever. As we can count product-ID frequencies in order to find the optimal productmix, we can find your purchasing habits by counting your chipcard-ID at the datamining company. So the police in their murder investigation does not need to ask "YOU" if you bought this particular brand of white shoeshine at this or that shop, the datamining company can tell when and where you bought it, how the product came to the shop, where you parked the night before.
GSM another great privacy intruder.
People go to bed with their mobile phones today. And calls get always answerred at the most idiot and inconvenient places and moments they shoudn't.
If we had a map of a city and then projected all mobile phones on it ass red pixels and we followed this cloud of red dots in time we would see how this red cloud washes through town. In the morning an individual phone user wanders a bit around at home, a trembling dot. Then a lot of dots go off to work and we see dots flowing through town, making long hauls through and out of town.Then they arrive at work where they are seen mostly stationary except for lunch and other breaks. In the evening we see the long haul again with stops at shopping centers etc. A bit like watching traffic lights in the night from some high point, but this has far greater detail, whe know who is where, we can time activities as drugstore shopping etc. and sleeping or cooking for complete populations particular when they live in uniform houses like appartment blocks etc.
Most people don't realise yet what a tremendous powerfull tool GSM-data is to track and "profile" all kinds of human behaviour. Wherther a single person or an multitude of arbitrary groups of people. How long does the average dinner shopping take for a given person at Tuesday afternoon's between 17:00 -18:30 hours.. Do you know? maybe, but they do... and with statistic accuracy.
So if you like some level of privacy, switch off your damn phone, or even better remove the battery...
Reference (in Dutch):
Volkskrant, Thursday 24 march 05, Is AIVD tracking grafity?, Volgt AIVD graffity?
Vrij Nederland, Saturday 26 march 05, Tapping Attorneys, Getapte Raadslieden.
,,Tapping Police tappingcentres, Getapte politie tapkamers.
RFID is een al wat oudere techniek die door kosten verlaging bereikbaar gaat worden (2005) voor massale inzet in consumenten goederen. Meestal denkt men bij RFID aan de intelligente sturing van het logistieke process. Toen ik afstudeerde (1990/1991) als levensmiddelentechnoloog werd er al over RFID onderwezen als belofte voor de toekomst want veel te duur. Voornamelijk als middel voor het waarborgen van productkwaliteit in de logistieke keten.
Als voorbeeld diende het volgen van een fles melk waarbij de fles voorzien is van een temperatuur sensor. Door RFID scanners op strategische kwaliteitsbepalende punten word niet alleen het product gevolgd maar ook de temperatuur onderweg, hierdoor weet men tot bij de winkelkassa dat de versheid van een product gewaarbord is. Het kan ook anders stel: Door een voedselvergiftiging op een buffet word een groot aantal feestvierders ziek en een aantal sterft. Wat is de oorzaak en wie is aansprakelijk? Doormiddel van de laboratorium onderzoek kan worden vastgesteld dat de vergiftiging is veroorzaakt door de ham in een salade. Aan de hand van de RFID is dan te herleiden dat de ham te lang en ge warm bewaard is bij de ... cateraar die deze ham nog overhad van een ander feest. Cruciaal is dat de RFID chip tijd en temperatuur opslaat op plaatsen en tijdstippen die kwaliteitsbepalend zijn.
RFID en intelligence
Hier is vooral van belang dat de rfid voorzien is van i/o capaciteiten, door de i/o mogelijkheden kan er door middel van sensoren data worden opgeslagen zoals: temperatuur, zuurtegraad, zuurstofgehalte.