The American media had a good laugh over a story that was briefly bandied about a couple of years ago. It seems that a certain manufacturer of consumer electronics had inadvertently released a batch of ‘defective’ video cameras to the public. These cameras had a most unusual feature: when used in a particular manner, they allowed the user to covertly film unsuspecting people sans clothing.
The press chuckled over this for a few days, particularly when noting that a recall effort by the company had not resulted in the return of very many of the faulty cameras. This is likely because the cameras were not actually defective, at least not in the normal sense of the word. In fact, they performed the normal home video camera functions quite well.
The problem was that they had an extra function. The company explained that this was due to a manufacturing defect – a bad batch of chips – and the story was quickly lost in the shuffle and forgotten. But beneath this seemingly inconsequential story of a company mishap lurked something far more sinister – a brief glimpse into Big Brother’s toolbox.
It can be safely concluded that these cameras were not by any stretch of the imagination ‘defective.’ They actually performed exactly as designed. The problem most likely was that a batch of cameras built for military and/or intelligence purposes found their way onto the consumer market. This obviously presented a bit of a problem for the company. They could not even admit that such technology exists, let alone that they were in the business of developing and manufacturing such devices. The solution? Blame it on a manufacturing defect.
True to form, the media appeared not to notice the patently absurd nature of this pathetic attempt at a cover story. The truth is that the intelligence community has spent decades researching and enormous amounts of cash developing and refining this very type of surveillance technology, and these cameras were one of the end results of that research.
The technology that gives these devices the ability to see through clothes is, needless to say, considerably more advanced than that which is found in your everyday home video camera. You just don’t get from one to the other through a manufacturing ‘flaw,’ just as color television wasn’t miraculously born when someone botched a batch of black-and-white picture tubes.
In truth, virtually all consumer electronics – as well as non-consumer technology utilized by business and industry – begins life in the intelligence community, and only after it has outlived its usefulness there does it emerge in the public sphere, often as the newest consumer craze.
The Polaroid camera is a classic example of this. Edwin Land, as has been reported, was a long time member of the intelligence community, where his area of expertise was electronic surveillance. Among other things, he played a key role on the U-2 spy plane project and presided over the Scientific Engineering Institute, a CIA front. (1) He is of course better known as the inventor of the famed camera.
The Polaroid was actually invented long before its debut on store shelves. It should be readily apparent to readers that this breakthrough technology – at a time when no one knew of its existence – would have been of enormous value to the spy-trade, which is precisely why the spooks utilized it for an untold number of years before it was ‘reinvented’ as a consumer product.
And so it goes with other high-tech innovations as well, including the nifty new through-the-clothes video cameras. This particular form of invasive technology has already begun to creep into the public sphere. Not long after the camera story aired, a local newscast carried a story about a new type of security system being trialed at a U.S. airport. In place of the standard metal detector that we have all come to know and love was what could best be described as an electronic strip-search machine.
This device utilized what appeared to be the very same technology that made its debut in the ‘defective’ cameras. As travelers and guests passed through the scanner, the operator was viewing what was described as a very accurate representation of their nude forms. As would be expected, this innovation did not seem to be well received and the limited media coverage was promptly dropped.
The surveillance of America, however, continues. Along with the through-the-clothes technology, we now also have through-the-wall surveillance capabilities. (2) And along with the ability to see through walls comes the ability to hearthrough walls as well. A device known as a laser-guided microphone can be pointed at any pane of glass, allowing the user to eavesdrop upon any conversation emanating from within a windowed structure.
Though a creation of high technology, this device is actually based on a rather low-tech concept: a pane of glass acts as a speaker, of sorts, vibrating in response to the sound waves striking it from inside your home. Any flat, non-rigid, membrane-like surface in a building acts in much the same way.
The drywall that covers the walls of your home, for instance, conducts sound as well. That is how sound travels through a wall. The sound waves strike the drywall on one side of the wall, which acts much like a microphone. Through the studs in the wall (the conduit or speaker wire, so to speak) the sound is transferred to the drywall on the other side, which through vibration then serves as the speaker.
But enough with the physics lessons. The point is that any pane of glass in a building is a potential speaker. And with the use of advanced military technology, it is possible to isolate and amplify the otherwise inaudible sound waves being broadcast from that window pane.
This technology is rapidly being shared with ostensibly civilian law enforcement agencies, so that local law enforcement will soon be able to conduct what amounts to a drive-by search of your home – looking and listening in – without your consent or even your awareness, at any time they should so choose.
Equally alarming is the proliferation of allegedly private firms, dubbed ‘data warehouses,’ whose sole function is the collection and cataloguing of data about American citizens. The Washington Post recently described how the warehouses function: “Twenty-four hours a day, Acxiom electronically gathers and sorts information about 196 million Americans. Credit card transactions and magazine subscriptions. Telephone numbers and real estate records. Car registrations and fishing licenses. Consumer surveys and demographic details.” (3)
Also readily available and fair game are medical records, financial and banking information, military records, marital records, and an array of other personal information. All of this information gathering is greatly facilitated by the technological advances that have been sold to the public as products and services that greatly benefit us as consumers.
For example, the move towards a ‘cashless’ society has allowed an unprecedented amount of personal data to enter the information marketplace. While it is undoubtedly a convenience to purchase virtually any good or service with an ATM or credit card, it is also quite true that doing so leaves an electronic trail that can and will be followed.
It is not just the types of products you are buying that is tracked, but where you are buying them as well. Your daily routines will, over time, show up in the ways in which you use electronic money. By databasing each transaction, your daily travels can be accurately constructed, as well as your shopping habits and various other aspects of your life.
Another great boom to the information gatherers has been the widespread popularity of the internet. I hate to be the one to break the news, but the innovation that allows you to gather information also allows others to gather information aboutyou. The internet was, long before Al Gore or anyone else ‘invented’ it, a military intelligence entity. It was designed, implemented and maintained by the intelligence community to fulfill its needs, not yours. And it continues to be an apparatus of the intelligence infrastructure today.
As the Encyclopaedia Britannica tells it: “The Internet had its origin in a U.S. Department of Defense program called ARPANET (Advanced Research Projects Agency Network), established in 1969 to provide a secure and survivable communications network for organizations engaged in defense-related research … at length the National Science Foundation (NSF), which had created a similar and parallel network called NSFNet, took over much of the TCP/IP technology from ARPANET and established a distributed network of networks capable of handling far greater traffic.” (4)
The encyclopedia also notes that, contrary to the current notion that no one controls the internet, “NSF continues to maintain the backbone of the network.” The same encyclopedia describes the NSF as “an independent agency of the U.S. government,” though what exactly an ‘independent’ agency of the U.S. government is receives no explanation. Other reports have noted though that the NSF has been heavily involved in funding and conducting MK-ULTRA research. (5)
Britannica explains that the foundation was “inspired by advances in science and technology that occurred as a result of World War II; the NSF was established by the U.S. Congress in the National Science Foundation Act of 1950.” What the NSF is, in other words, is one of a blizzard of intelligence fronts that were set up in the immediate aftermath of the forming of the CIA itself in 1947.
Of course, just because the beloved internet was begun as an intelligence entity and is still administered by a government agency doesn’t mean that it still functions as an intelligence tool. It is worth noting, however, that the company that was primarily responsible for repackaging the internet into a civilian entity, America Online, is perhaps the most thinly veiled intelligence front ever conceived.
This can be easily verified by a visit to AOL’s corporate website, where visitors learn – among other things – that the company is headquartered in Dulles, Virginia. Curious as to where this might be, I attempted to locate the city of Dulles on a couple of maps, to no avail. This, I learned, was because Dulles is actually an offshoot of Langley, Virginia.
Langley is also rather difficult to locate on a map. For the uninitiated, this is because Langley, Virginia is the home of the Central Intelligence Agency. In fact, there isn’t much else in Langley, Virginia, which exists almost exclusively to provide residence to the thousands of employees of the CIA’s headquarters.
And it is precisely there that you will find the home of AOL. Apparently recognizing the negative connotations of a Langley mailing address, the company essentially created a ‘suburb’ and named it Dulles. Dulles, by the way, is named in honor of the notorious Dulles siblings, Allen and John Foster, whose names were virtually synonymous with the U.S. intelligence infrastructure through both World Wars and much of the Cold War.
Another fact about AOL that belies its true function is the composition of its Board of Directors. Here you will find such high-level military/intelligence assets as General Colin Powell and General Alexander Haig. All of which gives a whole new meaning to that all-seeing eye that comprises the company’s logo.
The ways in which we are encouraged to use the internet also belie an intelligence function. Perhaps the most popular use is for communicating via e-mail, which is rapidly replacing other modes of communication. Not coincidentally, e-mail communications are far easier to intercept than are correspondence by phone or letter, especially given that they are traveling on a network designed by spooks.
Also increasingly popular is on-line shopping, which greatly facilitates the gathering of information about your shopping and spending habits. Yet more disturbing is the push for on-line banking, which is a great idea if you don’t mind your banking transactions being added to your information profile. Not that your banker isn’t already sharing that information anyway. (6)
The filing of taxes online is being heavily promoted as well. Anyone who now figures their taxes with a program such as Turbotax knows that there will be a steady stream of prompts to file your tax return electronically. Probably the same result could be obtained by sending your return directly to Langley. Of course, belief in the notion that the IRS doesn’t share your tax information with any other government agencies has always required a rather large leap of faith.
Perhaps the most alarming use for which the internet is now being promoted is for on-line voting. Though this may sound like an enormous benefit, particularly for those who – due to age or physical infirmity – find it difficult to get to a polling booth, it also means that the notion of secret ballot elections could soon become a distant memory.
There are other ways, as well, in which products hailed as a great boon to consumers are steadily eroding our privacy. These products invariably become ubiquitous virtually overnight, through heavy promotion and advertising coupled with rapidly falling prices. The most obvious example of this is cellular phones.
Cell phones have, of course, tremendously benefited consumers – particularly those arrogant buffoons who feel the need to trumpet their self-importance by making obnoxious calls on elevators. Yet cell phones have a dark side as well: they function as tracking devices, allowing your movements to be precisely monitored. This capacity is an integral feature of the phone: the communications satellite must know where you are in order for you to send and receive your calls.
As was reported in Rolling Stone, “In Japan, cell phones are used to track the precise whereabouts of their users (the software lets you punch in someone’s phone number and gives back his location, even the floor he’s on). A locational capacity is coming soon to American cell phones by order of the Federal Communications Commission.” (7)
Similarly, computerized navigational systems featured in new cars serve the same purpose. And again, this is an integral feature of the technology: the precise location of your vehicle must be known for the system to work. One report noted that: “Receivers for Global Positioning System satellites will become a feature in every new car’s navigational system, perhaps allowing a system ‘hacker’ to track your whereabouts to a centimeter’s accuracy.” (8)
It’s not likely though that system hackers are what you need be concerned about. The spooks who launched and maintain the GPS satellites through intelligence fronts like ITT should be of some concern, however. As should the law enforcement agencies with whom this information will undoubtedly be shared.
Even without the on-board navigational system, it will soon be possible to track any vehicle. One report has noted that “Vehicle Recognition Systems have been developed which can identify a car number plate then track the car around a city using a computerized geographic information system. Such systems are now commercially available.” (9)
As are facial recognition systems – powered by software “trained to measure spatial relationships among facial features and to convert that information into a mathematical map of the face.” (10) “The revolution in urban surveillance will reach the next generation of control once reliable face recognition comes in. In fact, an American company Software and Systems has trialed a system in London which can scan crowds and match faces against a database of images held in a remote computer.” (9)
The database is already being built, by the way. The Washington Post has reported that “A small New Hampshire company that wants to build a national database of driver’s license photographs received nearly $1.5 million in federal funds and technical assistance from the U.S. Secret Service last year.” (11)
The day is not far off when all of this technology will be combined to erode the last vestiges of privacy rights. As Marc Rottenberg – head of the Electronic Privacy Information Center – has noted: “People don’t quite get it yet … soon there will be computer files of facial images, and when you walk in (a building), your face will be instantly scanned by computer, so you’ll be recognized by name.” (7)
Picture the day when every store you enter will capture your photo (as is already the case), access a photo database via a high-speed internet connection and identify you by name, Social Security number, etc.. This identification will then be fed into another database from an information warehouse, revealing all the details of your life. Instantly.
Your shopping habits will be examined: do you normally shop in this type of store? If not, then what are you doing there? Your financial status will be examined: can you even afford to shop in this particular store? Your police record will be examined: remember that little shoplifting indiscretion in your youth?
And of course – just to be on the safe side – you might be digitally strip-searched upon entering and leaving the store as well. If you arouse too much suspicion, you might even be tracked after leaving the facility: “All these devices can be linked together and allow police to spy in real time.” (6) Then again, you could opt to just stay at home and do all your shopping via the internet. If so, remember to wave to the nice policeman conducting the drive-by search of your home.
1. Gordon Thomas Journey Into Madness, Bantam, 1989
2. Hans H. Chen “New X-Ray Vision Will Let Cops See Through Walls,” Sightings, July 21, 1999
3. Robert O’Harrow, Jr. “Data Firms Getting Too Personal?”, Washington Post, March 8, 1998
4. Encyclopaedia Britannica Online, www.britannica.com
5. Harry V. Martin and David Caul “Mind Control,” Napa Sentinel, August-November 1991
6. Edmund Sanders “Many Banks Giving State Extensive Customer Data,” Los Angeles Times, July 16, 1999
7. William Greider “The Cyberscare of ’99,” Rolling Stone #819, August 1999
8. “Big Brother Now Has An Inc. After It,” San Jose Mercury News, July 1, 1996
9. Scientific and Technical Options Assessment “An Appraisal of the Technologies of Political Control,” September 1998
10. “The Digital Mugshot,” Congressional Quarterly, Inc.
11. Robert O’Harrow, Jr. and Liz Leyden “U.S. Helped Fund Photo Database of Driver IDs,” Washington Post, February 18, 1999