Integrity Sweep Police Amsterdam:
Information from all over Amsterdam entering unfiltered into: Contra Terrorisme Box
in a combined effort of: KLPD, Politie and AIVD together in order to follow all regarded dangerous: persons and organisations
motivated by the killing of "Theo van Gogh"
Am I creasy, I see them putting spies among the personnel of the supermarkets where I am buying. So how is that with you?
References:
SIGNALS
Police versus Spy or Maffia
A spy is generally born and raised into the trade. It is not a profession, but a matter of lifestyle for this type of person.
He is trained from very young, possibly pre kindergarten. This affects mainly the following thema's that are extremely
important in relation to Communication and Surveillance:
Bodylanguage reading / listening
Bodylanguage: A cop can be very good at reading the bodylanguage sign's, learnt in some formal setting (school,
books video's etc and of course on the job through dealing with people. But he will probably never gain the level of
observational skill and understanding that somebody has gained by being born and raised in a social setting where
a skillfull lying is rewarded by mummy. Or where dad gives his son of 4 a secret sign that says "go and kick that
person, I will protect you" and an hour later a sign to his daughter "go ahead steal what you like". This results in
people that can skillfully steal etc. More inportant is that they have learned to communicate in a very subtle hidden.
Spy Training
Made some diagrams on how some of the AIVD tactics work: harrasment / stalking / provocation
+--+ +->| | Observation & Harrasment | +--+ monitoring, provocation, | || intimidation, manipulations | \/ | +--+ +--| | Manipulation of life chances +--+ losing: friends, work, accomodation, ^ || opportunities & | || finding new: "friends", "work", | || "accomodation" and "opportunities" | \/ | +--+ +--| | Gotcha, landed into created situation +--+ you find yourself in serious trouble, ^ || ready for chantage, blackmail and the like. | || Your "friends" / witnesses loyalty works against you. | \/ | +--+ +--| | Offer +--+ tell us all about ... work for us, do ... ^ || | \/ | +--+ +--| | Tool +--+ you have become a puppet for further development into mainly these directions: 1 agent provocateur: terrorist, criminal, liquidator 2 scene infiltrator: drugs, politics, IT, media, finance, Hells Angels, Kurds, etc.
on the issue of: Dutch Integrity Scan by Systematic Stalking
.====. // \\ || || || \/ || 0 <----- Fresh personnel in (X) || || || \/ || 0 ------ Crisis or Threat of some kind || || || \/ || 0 ------ Harassment & Confusion || || - help subject (Tamagotchi) a little || || - talk Sympathetic /\ || || \/ || 0 ------ Watch for Sympathizers || || || \/ || 0 ------ Filter || ||\ || || '----> symphathizers out (Y) || || \ || || '--> excess personel out \\ // .=====.
SECURE COMPUTING
Monitoring is mostly done by loading the visible system ontop of a invisible system (kernel) that resides in a single
chip. This system on a chip can be located on a memory module or in the BIOS itself. Thus becoming almost
undetectable. From here all keystrokes can be logged (keylogger) and the data securely transmitted over a VPN
or stored in memory. Operations like formatting are circumvented by having the BIOS move the data around while
formatting is in process.
Therefore I recommend using a public computer at some internet cafe but leave your mobile home or pull the battery
first long before you start looking for the shop. And of course you will never combine your private- with the secure-
work, not in this sessio not in this cafe not today. KEEP iT SEPERATE AT ALL TIME!!!.
CHIPKNIP
Cash is cash, but with electronic money so much data is gathered for commercial purposes that your privacy is very
surely at risk. As an exampe I will describe what is done when you pay electronically at a candy vending machine:
The owners / operators have an interest to manage the cost of operating their machines. Therefore they keep a
database of all machines and all transactions. Data collection is cheap enough but managing all this data and
transforming it into usefull data is difficult and an expensive bussiness. So that will be outsourced to specialised
companies that are dealing with many more data gathering and data transformation applications like these. How
convenient for the security of the state... The question, how do I earn the most money from my machine breaks down
to the following questions:
GSM another great privacy intruder.
People go to bed with their mobile phones today. And calls get always answerred at the most idiot and inconvenient
places and moments they shoudn't.
If we had a map of a city and then projected all mobile phones on it ass red pixels and we followed this cloud of red
dots in time we would see how this red cloud washes through town. In the morning an individual phone user wanders
a bit around at home, a trembling dot. Then a lot of dots go off to work and we see dots flowing through town, making
long hauls through and out of town.Then they arrive at work where they are seen mostly stationary except for lunch
and other breaks. In the evening we see the long haul again with stops at shopping centers etc. A bit like watching
traffic lights in the night from some high point, but this has far greater detail, whe know who is where, we can time
activities as drugstore shopping etc. and sleeping or cooking for complete populations particular when they live in
uniform houses like appartment blocks etc.
Most people don't realise yet what a tremendous powerfull tool GSM-data is to track and "profile" all kinds of human
behaviour. Wherther a single person or an multitude of arbitrary groups of people. How long does the average dinner
shopping take for a given person at Tuesday afternoon's between 17:00 -18:30 hours.. Do you know? maybe, but they
do... and with statistic accuracy.
So if you like some level of privacy, switch off your damn phone, or even better remove the battery...
Reference (in Dutch):
RFID
RFID is een al wat oudere techniek die door kosten verlaging bereikbaar gaat worden (2005) voor massale inzet in
consumenten goederen. Meestal denkt men bij RFID aan de intelligente sturing van het logistieke process. Toen ik
afstudeerde (1990/1991) als levensmiddelentechnoloog werd er al over RFID onderwezen als belofte voor de toekomst
want nog veel te duur. Voornamelijk als middel voor het waarborgen van de productkwaliteit in de logistieke keten.
RFID in de logistiek Als voorbeeld van toen diende het volgen van een fles melk waarbij de verpakking voorzien is
van een RFID-tag met temperatuur sensor. Door RFID scanners op strategische kwaliteitsbepalende punten word
niet alleen het product gevolgd maar ook de temperatuur op locatie in de tijd onderweg, hierdoor kan men, voor de
dagelijkse praktijk is dit per eenheid niet zo interessant maar wel goed uitvoerbaar, tot in de koelkast van de klant
het temperatuur verloop dat pak melk onderweg van fabriek naar klant volgen.
Maar stel dat: Door een voedselvergiftiging op een buffet een groot aantal feestvierders ziek word en een aantal zelfs
sterft. Wat is de oorzaak en wie is aansprakelijk? Doormiddel van de laboratorium onderzoek kan worden vastgesteld
dat de vergiftiging is veroorzaakt door de ham in een salade. Aan de hand van de RFID is dan te herleiden dat de ham
te lang bewaard is bij een te hoge temperatuur maar ook by wie!
de cateraar die deze ham nog overhad van een ander feest...
zijn leverancier...
onderweg in een auto met kapotte koeling...
Cruciaal is hier dat de RFID chip tijd en temperatuur registreerd en rapporteerd op plaatsen en tijdstippen die
kwaliteitsbepalend zijn.
RFID en intelligence
Hier is vooral van belang dat de rfid voorzien is van de i/o capaciteiten die ook de melk en ham volgende RFID-tag
kenmerken, een zeer goedkoop gemaakt massaproduct dus. De i/o (input/ output) mogelijkheden geven de tag
enorme mogelijkheden om doormiddel van sensoren temperatuur, zuurtegraad, zuurstofgehalte etc te volgen en
door electroden andere processen aan te sturen. In de medische wetenschap kan een ingenomen tag er voor zorgen
dat precies op de goede plaats en moment een medicijn afgegeven word in het spijsverteringskanaal, of de hartslag
gevolgd en eventueel bijgestuurd wordt. Een RFID-tag die tegen een zenuw geplaatst wordt kan na externe aansturing
complete spiergroepen of levensfuncties uitschakelen.
Waarmee de wereld van George Orwell doordringt tot in het menselijk lichaam...