What’s Up With WhatsApp? ‘Private’ Chats Not So Private After All

Posted on Updated on

Sputnik News


Another social media storm is brewing on how private your private messages really are. WhatsApp recently hit the headlines in Britain amid reports the Prime Minister wanted to ban the messenger service because it uses encrypted data which preserves users’ privacy.

This is data that Britain’s Prime Minister and UK Home Office want access to so that they can stop criminals and potential terrorists from operating in a so-called “safe place”.

“There shouldn’t be a guaranteed safe space for terrorists, criminals and pedophiles to operate beyond the reach of the law,” said a Downing Street statement.

But it appears WhatsApp isn’t so safe, after all.

A new report from the Electronic Frontier Foundation (EFF) titled ‘Who Has Your Back? 2015: Protecting Your Data From Government Requests’ has found that WhatsApp, the instant chat service owned by Facebook, failed to meet industry best practices, communicate government data demands to its users, and to disclose its policies on data retention, as well as disclosing the extent of government content removal requests it receives.

“Although the EFF gave the company a full year to prepare for its inclusion in the report, it has adopted none of the best practices we’ve identified as part of this report,” says according to the foundation.

Meanwhile, all but three of the tech companies evaluated by EFF openly opposed backdoors for authorities to garner encrypted information.

“One of the big trends we’re seeing across the tech industry is a rejection of government-mandated security weaknesses. In fact, 21 of the 24 companies we evaluated took a public position opposing backdoors. This is a powerful statement from the technology community.”

Meanwhile, Britain is pressing ahead with a new Communications Data Bill, nicknamed the ‘Snooper’s Charter’. The legislation, proposed by Home Secretary Theresa May would require Internet Service Providers and mobile phone companies to keep records of each user’s communications data.

This means, every instant chat, every telephone call, every email and even what you browse for on Google would be stored for at least 12 months. The bill has been beaten back before by privacy campaigners and former Deputy Prime Minister and LibDem leader Nick Clegg. But May wants this new piece of legislation introduced by the next parliament.

So according to the report, if you don’t fancy any prying eyes on your WhatsApp chats, switch to Dropbox, Adobe, Apple, Wikimedia, WordPress and Yahoo instead.

Sputnik News

Windows 10 Is Spyware

Posted on Updated on

The New American
by C. Mitchell Shaw


If you are currently a Microsoft user running either Windows 7 or 8, you are eligible for a free upgrade to the “new and improved” Windows 10. But before you upgrade, be aware that it’s free as in price, not as in liberty. Many of the new features and settings of Windows 10 have been deemed spyware by computer security experts. It’s one thing to have programs and applications spying on you. It’s another thing altogether to have your operating system designed to do it.

When Microsoft announced the “free” upgrade, many were left wondering why the Redmond giant would give away licenses to use the new operating system. Now it appears that the reason is simple: greater data-mining opportunities. Windows operating systems have long included security weaknesses that leave users vulnerable to spying and data-mining from others. What is different with the newest iteration of Windows is that Microsoft is directly involved in that spying and data-mining and has built the entire operating system in such a way as to allow it.

To install the Windows 10 upgrade, users must agree to the Microsoft Services Agreement and its accompanying documents. Few will ever read the terms of these documents since they span some 40,000 words and would run 110 pages if printed. As is to be expected, most of the terms are written in legalese and are not overly easy to understand. There are some parts of the terms that users need to be aware of, though, because agreeing to them grants Microsoft the right to read, save, and share anything stored on or accessed using any computer running Microsoft Windows as well as any computer using Microsoft products or services.

The Microsoft Privacy Policy, which begins by saying, “Your privacy is important to us,” goes on to address the types of data collected by using Windows or other Microsoft products or services. That data includes the user’s name, e-mail address, postal address, phone number, passwords, password hints, age, and gender, as well as other personal information, including:

Interests and favorites. We collect data about your interests and favorites, such as the teams you follow in a sports app, the stocks you track in a finance app, or the favorite cities you add to a weather app. In addition to those you explicitly provide, your interests and favorites may also be inferred or derived from other data we collect.

That is a lot of information about users. But it doesn’t end there. Microsoft also collects data on people who may not even use Microsoft products or services:

Contacts and relationships. We collect data about your contacts and relationships if you use a Microsoft service to manage contacts, or to communicate or interact with other people or organizations.

But what about the data actually stored on the PC? That is covered in the Privacy Agreement as well. Here’s a hint; When Microsoft says, “Your privacy is important to us,” it means the company wants to take your privacy from you and use your personal information for its own purposes. The agreement says:

Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary.

If you are not comforted by Microsoft’s “good faith” assurances, you are probably thinking correctly. Considering the company’s record dealing with users’ data and the depth of snooping that the Microsoft Privacy Agreement allows, “good faith” isn’t what it used to be.

Since all these policies apply to all Microsoft products and services — including Windows 7 and 8 — what makes Windows 10 different? When Windows 10 is installed, the default settings will allow all data to be collected and shared with Microsoft. Because users agree to this by simply clicking a button when they install the operating system, and because it is all turned on by default, most of the millions of Windows users will have no idea that they have given Microsoft nearly unlimited access to everything they do on their computers.

Because Windows 10 is set up to allow all this data collection by default, disabling data collection (where it is even possible to do so) will also disable most of the features that are the main selling points of the operating system. In addition, it is an arduous and time-consuming process involving going through at least 13 different screens in the privacy settings.

By way of comparison, users who install any of the various distributions of the Linux operating system do not consent to any such agreements. In fact, the closest thing in Linux to any of this is a feature in Ubuntu that allows users to search Amazon from their desktop screen. That feature is easily disabled by clicking a single button.

Maybe users of Windows 7 and 8 who are concerned about privacy and liberty should consider declining Microsoft’s offer for a free upgrade and simply “upgrade” to Linux.


[In the interest of fairness, the writer of this article has been a Linux user for several years and does not use any Microsoft products or services. This article was written on his System76 Bonobo Extreme running Ubuntu 14.04 using LibreOffice 4.2.]

The New American

Exposed: Big Brother’s ‘Unique and Productive’ Relationship with AT&T

Posted on Updated on

Common Dreams
by Deirdre Fulton

The NSA documents cite AT&T's "extreme willingness to help." (Mike Mozart/flickr/cc)The NSA documents cite AT&T’s “extreme willingness to help.” (Mike Mozart/flickr/cc)

Newly disclosed National Security Agency documents show that the U.S. government’s relationship with telecom giant AT&T has been considered “unique and especially productive,” according to a joint investigation by the New York Times and ProPublica published Saturday.

The news organizations, whose team of journalists included Laura Poitras and James Risen, report that AT&T’s cooperation has involved a broad range of classified activities. The revelations are based on a trove of documents provided to the Times and ProPublica by NSA whistleblower Edward Snowden.

AT&T has given the NSA access, “through several methods covered under different legal rules,” to billions of emails, metadata records, and cellphone call records as they have flowed across its domestic networks, according to the reporting. 

“The NSA’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, according to the documents,” the investigation revealed. “The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency.”

The direct link to AT&T isn’t explicit in the documents, as the corporate partnerships are referred to by code names. However, an analysis of “Fairview” program documents by the Times and ProPublica “reveals a constellation of evidence that points to AT&T as that program’s partner,” the article states. Several former intelligence officials confirmed that finding.

Privacy rights groups reacted to the news with outrage, if not surprise.

The Electronic Frontier Foundation said the reports “confirm what EFF’s Jewel v. NSA lawsuit has claimed since 2008—that the NSA and AT&T have collaborated to build a domestic surveillance infrastructure, resulting in unconstitutional seizure and search of of millions, if not hundreds of millions, of Americans’ Internet communications.”

Furthermore, said EFF executive director Cindy Cohn, the documents “convincingly demolish the government’s core response” to the Jewel lawsuit—that EFF cannot prove that AT&T’s facilities were used in the mass surveillance.

”It’s long past time that the NSA and AT&T came clean with the American people,” Cohn declared. “It’s also time that the public U.S. courts decide whether these modern general searches are consistent with the Fourth Amendment’s guarantee against unreasonable search and seizure.”

In its response to what it described as a “blockbuster” story, the progressive phone company CREDO Mobile declared: “It’s beyond disturbing though sadly not surprising what’s being reported about a secret government relationship with AT&T that NSA documents describe as ‘highly collaborative’ and a ‘partnership, not a contractual relationship’.”

“CREDO Mobile supports full repeal of the illegal surveillance state as the only way to protect Americans from illegal government spying,” CREDO vice president Becky Bond continued, “and we challenge AT&T to demonstrate concern for its customers’ constitutional rights by joining us in public support of repealing both the Patriot Act and FISA Amendments Act.”

Common Dreams

Facebook’s New “Snitch and Snatch” Surveillance Program Provides Intel to Jade Helm

Posted on Updated on

The Common Sense Show
by Dave Hodges

facebook internet browses you


Technology is neutral. The same gun that is used to hunt for a life sustaining source of food, can be used to murder an innocent human being. In short, technology can be used for either the welfare of humanity or to the detriment of humanity.

In July, I learned that Facebook had instituted a new software program that ties directly into the new artificial intelligence programs connected to Jade Helm. I was told by my source that the program would ultimately be defended as a means to protect children from child molestation and that law enforcement would be dispatched by Facebook before an attack upon a child could be realized. I was also asked to wait to post this information until the cover story was in place in order to discredit this cover story.

The time to expose the Facebook controlled surveillance grid is now. The program has been in place since January and it has been rolled out just as I was told it would be in that this program will “protect children from predators”. Further, the early press release from Russia Today, the media outlet chosen to provide cover for Facebook’s latest intrusion into our private lives, states that the surveillance program’s further purpose is to detect person(s) or groups who are a “threat to national security” (i.e. people who are not on board with the encroaching tyranny currently unfolding in this country.

If the surveillance program was indeed legitimate in that Facebook really intends to only use this program to protect Americans, the choice of Russia Today (RT) to announce the roll-out of this program is a very poor decision.

I have had very negative dealings with the Russian media which has gained a significant foothold inside of the United States. In the Russian media’s protestations over an article I wrote two years ago exposing the propaganda nature of the domestic based Russian media, one of their officials actually wrote to the comment board of The Common Sense Show and stated that “although their entity is state owned media, they do not use propaganda all the time”. By the way, the Russian media was attempting to discredit me, at that time, because I had published videos and photos of Russian soldiers training on American soil on multiple occasions. Just for posterity’s sake, here is a picture of Russian troops at Ft. Carson. These are the same Russians training on American soil that RT, Pravada (lol-“the truth) and the Voice of Russia have tried so hard to cover up.

This picture and the one above it depict Russian soldiers at Ft. Carson. The Russians and other foreign troops (e.g. Germans, Canadians, Danes) are part of Jade Helm. They are here to carry out the mission should American troops stand down.

This picture depicts Russian soldiers at Ft. Carson. The Russians and other foreign troops (e.g. Germans, Canadians, Danes) are part of Jade Helm. They are here to carry out the mission should American troops stand down in the upcoming martial law crackdown.

Subsequently, it is my mission in this article to expose the heinous invasion of privacy by Facebook, once again, by exposing the duplicitous nature of the domestic based state-owned Russian media and to inform the public on the true purpose of this new surveillance program.

Facebook to Provide Intel to Jade Helm and the National Surveillance State

As if you needed another reason to mistrust Facebook for its role in the police state national surveillance grid, there is one more reason to ditch Facebook and look for an alternative site for social media such as

All in the name of keeping us safe, Facebook has introduced a new software program which is designed to browse postings and look for criminal activity. It works much the same way as the NSA as it looks for “criminal patterns” of behavior as discovered by key word searches conducted by a computer. As with the NSA, when a significant hit against a Facebook user is found, it alerts a human analyst, in Facebook’s case, a 21 year old mindless troll, who then makes a decision on whether or not to contact law enforcement.

The video, offered below, presents the notion of spying on Facebook users to be an good idea, as previously mentioned, because RT presented a partial set of covert Facebook spying protocols in which child predators would be caught before they could carry out their heinous acts against children. This is an excellent starting point to get the American people to acquiesce to the latest intrusion into one’s privacy because, of course, nobody is going to disagree that child predators need to be stopped. RT and Facebook are employing the psychological principle of incrementalism in that we present the program as being benign to today, but the program can easily be escalated to more nefarious purposes.

Red Alert

In this scheme, Facebook reports directly to the NSA, who in turn, reports to DHS. This then ties in with the Artificial Intelligence (AI) which coordinates with all the need-to-know parties such as Jade Helm with regard to American who are “citizens of concern”.

Criminal behavior of all types is in the eye of the beholder. For example, as we approach, as a nation, the threshold that telling the truth is truly a revolutionary act, then anyone who disagrees with the status quo authority can be marked for surveillance and later harassment by any social media site. The end result could be detention or worse.

The NSA, the CIA, ISIS, and now Facebook, it is all the same.  Further, time and time again on my site, I have documented that the American people should never take the Russian media seriously and that Facebook will prove to be on of the enemies of the people when the excrement hits the fan.

In other words, you log on here:


And end up here:

Work has been considered by some to be kind of a home away from proposition.

Facebook: It is all for the greater good.

Hold you nose as you watch the following video which presents this intrusion as a good thing. Here is a superficial RT report on this new threat to privacy, liberty and tyranny and just like Santa, they are making a list and checking it twice. Reservations are being made based upon programs like this. Of course, you may continue to use Facebook at your own peril.



CSS Offical-New-Logo2

The Common Sense Show

Local Police Take The Eye Of Big Brother And Spy On Americans

Posted on Updated on

Mint Press News
By Sean Nevins

“What we often see is police departments or local law enforcement agencies grabbing technologies without any policies in place for it, not asking anybody’s permission, just sort of getting it, [and] starting to implement it,” a digital rights activist tells MintPress.

Police using 'Public Eye' surveillance software.

Police using ‘Public Eye’ surveillance software, which claims to ‘leverage mobile technology and social media for public safety.’

Fast on the heels revelations of dragnet surveillance devices used by the likes of the National Security Agency and the CIA, another set of tools used by local police in communities across the United States is invading the privacy of the American public, tracking their movements.

“If you were to put an automatic license plate reader next to a road that people have to use to get to a demonstration, you could have a list of every single person who attended that demonstration. That’s really concerning,” Nadia Kayyali, a digital rights activist and lawyer, told MintPress News.

An automatic license plate reader (ALPR) is a high-speed camera that reads and captures an image of every license plate that comes into its view. Like biometric collection devices and “Stingrays,” ALPRs are just one of the devices used by local police to track, identify and monitor Americans.


ALPRs, privacy and the Fourth Amendment

The National Highway Traffic Safety Administration granted hundreds of thousands of dollars to state and local police to procure ALPRs, the American Civil Liberties Union (ACLU) reported last month.

The ACLU’s website states that ALPRs are being used by the NHTSA for highway safety purposes, but it is unclear whether law enforcement agencies might also be using them for non-safety purposes.

A camera is mounted near the rear window of a police car

A camera is mounted near the rear window of a police car in Little Rock, Ark. The device is part of a system that scans traffic on the streets, relaying the data it collects to a computer for sifting. Police say the surveillance helps identify stolen cars and drivers with outstanding arrest warrants. (AP Photo/Danny Johnston)

“The NHTSA should not be funding police technology for surveillance purposes and it should not let law enforcement apply for funding to decrease traffic fatalities and then turn around and use those funds to track people not suspected of any crime,” wrote Bennett Stein of the ACLU’s Speech, Privacy, and Technology Project.

The International Association of Chiefs of Police conducted a privacy impact assessment of ALPRs in 2009. They found that there are no uniform policies police departments have to abide when using the technology. Ultimately, the IACP concluded, this could result in the technology being “mismanaged or misinterpreted with real-world consequences.”

The IACP report continues: “Moreover, the potential misuse of [license plate reader] LPR data may expose agencies operating such systems to civil liability and negative public perceptions.”

One effect of ALPRs, which the report describes as “chilling,” is their potential to leverage surveillance as a form of social control.

“Specifically, the risk is that individuals will become more cautious in the exercise of their protected rights of expression, protest, association, and political participation because they consider themselves under constant surveillance,” states the report.

A camera mounted on the trunk of a police car  scans traffic on the streets, aggregating data such as patterns on travel and frequency of visits to a certain area.

A camera mounted on the trunk of a police car scans traffic on the streets, aggregating data such as patterns on travel and frequency of visits to a certain area.

ALPRs can also record and collect intimate details about people’s lives, such as their attendance at meetings for addiction or counseling, doctor visits, and participation at political protests, explains the report.

“It’s similar to phone metadata, that especially when you are keeping this data for a long time and you are putting it in a database you can actually end up getting a lot of information about somebody,” Kayyali said, referencing revelations by Edward Snowden in 2013 that the NSA was spying on Americans. The bulk collection of this data by the NSA was ruled as unlawful by a U.S. appeals court in May of this year.

Kayyali told MintPress the Fourth Amendment is intended to protect citizens from this kind of surveillance, noting: “The principle of the issue that if you’re not doing anything wrong you shouldn’t have to be concerned that government is recording all your movement.”

“We have privacy as a way to guard against government overreach,” she asserted.


Biometrics and “Stingrays”

Other devices being employed by various law enforcement agencies across the country, including biometric collection devices and “Stingrays.’’

A traveler arriving at Washington Dulles International Airport Monday uses the new US-VISIT mechanism that records all 10 fingerprint images. Photo: Gerald Nino/CPB

A traveler arriving at Washington Dulles International Airport Monday uses the new US-VISIT mechanism that records all 10 fingerprint images. Photo: Gerald Nino/CPB

Biometric devices are gadgets that collect personally identifying physiological information, such as fingerprints and facial features, or record behavioral characteristics for identifying traits, like unique mannerisms and lifestyle patterns.

The danger here is the forfeiture of anonymity and diminished privacy of U.S. citizens at the hands of law enforcement and the industries that promote the spread of these technologies.

“Stingrays,” meanwhile, mimic cellphone towers, allowing police to extract identifying information from people’s cellphones.

An inforgrapic demonstrating how a Stingray device works via a USA Today investigation

An inforgrapic demonstrating how a Stingray device works via a USA Today investigation

“When used to track a suspect’s cell phone, they also gather information about the phones of countless bystanders who happen to be nearby,” the ACLU explains on its website.

Stingray is the brand name for an international mobile subscriber identity locator, a device which can monitor who someone is calling, when he or she made the call, and the location of the caller. And some can even capture conversations, according to the Electronic Frontier Foundation, a nonprofit organization committed to defending civil liberties in the digital world


So what can you do?

To help answer this question, the EFF and Muckrock, a collaborative news site that brings together journalists, researchers, activists, and regular citizens to request, analyze and share government documents, launched a website last week. The website, “Street Level Surveillance,” acts as a kind of clearinghouse for local police spy technology.

An individual’s image is captured by an officer using a webcam after going through the PACE (Police And Criminal Evidence) checks

An individual’s image is captured by an officer using a webcam after going through the PACE (Police And Criminal Evidence) checks. The image of the individual is then captured by the system and analyzed for biometric markers..

“This is designed to help everybody from journalists to activists to lawyers who are working on these issues,” Dave Maass, an investigative researcher with the EFF, told MintPress. “It is designed to benefit people in the community, whether those are people acting on their own behalves, people who serve as watchdogs, or defend the rights of everyday people.”

The website features information about surveillance tools used by local law enforcement agencies all over the U.S., how they’re used, the hidden dangers they pose, as well as news and other research on those devices.

The website also invites readers to actively participate in countering surveillance by filing a public records request to determine what kind of biometric technologies are being used in their own communities.

“How do you fight the surveillance state on the local level? One way is to gather intel on the intelligence gatherers,” the site advises. “This information is useful because it can help structure policy debates. Public records requests can also influence agencies. Government officials are more apt to act responsibly when they know they’re being watched.”


Grassroots efforts to end surveillance

Maass also urges the public to counter surveillance measures by local police by advocating against such measures to policymakers in local communities.

“Advocating with your policymakers, whether that’s your city council, your board of supervisors — I mean, these are important things, and the more information that’s out there, the more debate is fueled,” he said.

Nadia Kayyali, the digital rights activist and lawyer, told MintPress she hopes this kind of advocacy results in local governments slowing down their acquisition of surveillance technologies. She said, “They really need to stop, take a step back, and say, ‘Why are we adopting these? What problem are we trying to solve? Is this really the best way to do it?’”

She also wants the federal government to stop providing the funds that enable local law enforcement agencies to purchase these technologies without questioning whether those agencies will use them wisely.

Echoing Kayyali, Maass says this is the main problem. He explained:

“What we often see is police departments or local law enforcement agencies grabbing technologies without any policies in place for it, not asking anybody’s permission, just sort of getting it, [and] starting to implement it.”

Privacy issues are rarely brought up, he continued, and when they are, it’s not until after people realize what’s going on. But at that point, he says, it’s difficult to get lawmakers and city council members to take powers away from the police because they don’t want to be seen as being soft on crime.

“It’s really important to have this debate before the technology is purchased so informed decisions can be made about purchasing the technology,” he said.

Mint Press News

CIA is Using “Man’s Best Friends” for Spying

Posted on Updated on

New Eastern Outlook
by Vladimir Platov


The activities of American intelligence services have received a somewhat extensive coverage from both the written media and different movie makers, and not just from Hollywood alone, which is explainable if one is to consider the staggering amount of funds that are being allocated by the US Congress on the secret operations of such institutions.

Therefore, recent revelations about the activities of US intelligence services that have been published by WikiLeaks and other alternative sources of information can hardly surprise anyone. In fact, what is surprising is the casual approach of German, French, and British politicians towards the fact that on top of being financially and militarily dependent on Washington, they are being constantly spied on.

The electronic surveillance means that are being used by the CIA and the NSA, elaborate software like PRISM and Xkeyscore, which allows the United States to control more than 75% of the global Internet traffic, and the 24/7 wire tapping is just the tip of the iceberg. However, Washington’s desire to establish total control over the world is not limited by electronic means alone.

Even man’s best friends are being used as an effective and completely unremarkable source of information about almost any target. Pets enjoy a somewhat universal affection, therefore they are able to freely infiltrate the most guarded secret facilities and high-ranking meetings alike. Throughout the world pets are being treated with sympathy and respect, especially when they belong to the most influential people in the world.

It’s curious that pets dwelt in the White House throughout the better part of American history, since 38 out of 44 American presidents had dog or some other pet at their side. In the US one can find a special museum dedicated to animals that had enjoyed the love of American presidents, starting from Nelson – George Washington’s favorite horse and ending with Obama’s pet dog – a Portuguese Water Dog named Sunny.

After all, the presence of a pet beside a president is an important PR factor that underlines the fact that he’s a “human after all.” Therefore, a US president without a pet dog – is a true anomaly in American politics. In addition, even in the walls of the White House, one might be compelled to feel the detachment due to numerous internal enemies. In this context the famous line of Harry Truman, that reads: “If you want a friend in Washington, get a dog”, makes a lot of sense.

The most famous and popular dog that has ever walked the corridors of the White House was the pet English Springer Spaniel named Millie, which belonged to the 41st President George H. W. Bush and his wife Barbara. Millie “co-authored” the bestseller “Millie’s Book: As Dictated to Barbara Bush” where Barbara Bush colorfully depicted the life in the White House through the eyes of a spaniel.

These facts are all the more curious if one is to consider an articles that was published in The Atlantic about the secret CIA program «Acoustic Kitty», that was dedicated to the use of cats for intelligence purposes. According to a recent CIA officer Victor Marchetti, cats were used for spying with implanted with electronic chips. One of such cats was even sent “behind enemy lines” to spy in a Soviet Embassy in Washington during the Cold War years.

So Angela Merkel and other influential politicians that are being constantly spied upon should not simply fear that top secret information might be stolen from their smartphones, laptops and cell phones, but should also keep a keen eye on their pets, since they can be a tool of American intelligence agencies too. Especially it is important when those pets were gifts by some American politicians or “friend” to share one’s secrets later on with the CIA and the NSA.

Vladimir Platov, an expert on the Middle East, exclusively for the online magazine “New Eastern Outlook” .

New Eastern Outlook

“Smart Cities” to Spy on You in Ways Orwell Never Imagined

Posted on Updated on

The New American
by Alex Newman


The Orwellian cities of the future being designed and imposed right this instant all over the world — so-called “Smart Cities” — will be watching you. In fact, they already are watching you. And unless humanity takes action soon to rein in its would-be omniscient rulers, the technological dystopia being erected all around you will ensure that governments and dictators know virtually everything about everyone — perhaps more than individuals know even about themselves. The plot to create the total surveillance state under the guise of making cities “smart” will cost taxpayers trillions of dollars, too. But the price tag in terms of lost privacy and liberty will be far higher.

As the concept of “smart” cities continues to evolve with technology, countless definitions and terms to describe the scheming have been proposed. Discussing a planned “smart” city in South Korea, Frederic Ojardias, Ph.D., at Seoul National University’s Graduate School of International Studies said the concept is simple. “The city is filled with sensors and cameras at every corner (monitoring temperature, traffic, electricity) that are all interconnected and linked to a central ‘brain’ that computes all this information in real time in order to optimize the management of the city, minute by minute,” he said to describe the vision.

According to the Institute of Electrical and Electronics Engineers, “smart cities” bring together technology, government, and society to enable a smart economy, smart environment, smart living, smart governance, and more. There are also a number of technologies associated with smart cities. Among them: “Intelligent lighting; Smart building controls; Wireless charging for automobiles; Facial recognition; Wind turbines; Intelligent Buildings; A connected self-aware environment;” and much more.

And that is just the beginning, with tech giants coming up with new technology every day that could be used to improve lives — or destroy liberty and privacy. Already, the former head of the NSA and CIA has been boasting that “we kill people based on metadata.” With “smart” cities providing unfathomable amounts of data to authorities, Americans can expect the lawlessness to continue accelerating if nothing changes.  

Of course, “smart” technology is already ubiquitous, from so-called “smart” phones that double as portable espionage devices to “smart” meters used (when they are not exploding at least) to spy on people’s water and electricity use. Smart TVs now spy on their users, too. Schools are doing it as well. According to news reports, in London, data gathered from cameras is cross-referenced with government lists of people who have paid their driving fees, allowing violators to be identified and punished. Authorities in Amsterdam, Barcelona, Stockholm, and other cities are also openly and purposely trying to become “smart.” In South Korea and the United Arab Emirates, fully “smart” cities are being designed and built from the ground up.     

With facial-recognition software now extremely advanced, and billions of people around the world posting their data and pictures online through social-networking services, hand-held “smart” technology has already created potentially totalitarian tools far beyond anything George Orwell could have imagined in his worst nightmares. Even years ago, U.S. cities were exposed rolling out so-called “Intellistreets” streetlights that double as Big Brother espionage tools to listen in on conversations. Entire smart cities are the next logical step, and the establishment is going all out to promote them as it works to abolish cash and shift everything online at the same time.

During a recent visit to India, for example, Obama pledged some $4 billion in U.S. taxpayer “investments and loans” to help Indian authorities build infrastructure, including $2 billion for the government there to create “smart cities.” Speaking to a large crowd, Obama said America was committed to the “smart cities” concept, linked to United Nations “sustainability” programs such as Agenda 21, and would help the Indian government pay to build them. To start with, 100 Indian cities are going to be made “smart.”

“We are ready to join you in building new infrastructure … roads and airports, the ports and bullet trains to propel India into the future,” Obama told Indians, without offering any hints on where the debt-riddled federal government would get the funds to propel India into the future or why U.S. taxpayers should fund it. “We are ready to help design smart cities.” Critics lambasted the scheme from all angles, pointing out that the U.S. government is already drowning in debt and that the whole “sustainability” theme behind the radical “smart cities” agenda represents a major threat to liberty, markets, and more.  

Around the same time, arch sustainability profiteer (and self-styled inventor of the Internet) Al Gore joined with former Mexican President Felipe Calderón at the World Economic Forum to demand that all cities worldwide be made “smart.” For a mere $90 trillion (as a starting point), the two globalist crusaders against carbon dioxide explained, every city in the world could be made much denser — a so-called “smart city” in which citizens would be packed in like sardines, and hence, easier to control.

Under the Gore-Calderón vision, personal transportation such as cars would be phased out as the “smart cities” of the future force everyone to either walk or rely on government-run transportation to get around. Ironically, perhaps, more than 1,700 private jets descended on Davos for the confab so its occupants could plot new ways to reduce the CO2 emissions of the unwashed masses as they are corralled into their “smart” cities (often at gunpoint). Of course, the plan to pack humans into tiny cities is not new, and has been advancing under UN “Agenda 21” and other schemes for more than two decades. And the UN has been promoting “smart” cities since at least 2009, when UN chief Ban Ki Moon called for “better, more equitable urban planning” and “new ideas from smart cities around the world” to guide “sustainable urbanization.”

Alleged benefits of the interconnected ecosystem of data-gathering technology, such as better traffic management, catching criminals, and a smaller “carbon footprint” for city residents, are being shouted from the rooftops by those seeking to push the agenda — governments, profiteers, futurists, and others. Businesses, too, will be able to harness the gargantuan amounts of data being produced to target individual consumers. The darker side of the shift toward intelligence-gathering everything, everywhere, however, has been largely buried from public discourse — not to mention the dangers of combining all of the information with emerging “artificial intelligence” technologies.

In a recent puff piece promoting the potential benefits of “smart cities” in the Wall Street Journal, CEO Mike Weston with the “data-science” consulting firm Profusion offered some terrifying insight into the awesome powers that will be available to the rulers of these future Orwellian cities. “In a fully ‘smart’ city, every movement an individual makes can be tracked,” Weston observed, noting that governments and municipalities from Boston to Beijing were pledging billions of tax dollars to the plot. “The data will reveal where she works, how she commutes, her shopping habits, places she visits and her proximity to other people.”

While Weston focuses largely on the profit opportunities surrounding all of that data for marketers, and ethical concerns for businesses, the same data will also enable authorities to compile unimaginably detailed profiles of every single individual. “By analyzing this information using data-science techniques, a company could learn not only the day-to-day routine of an individual but also his preferences, behavior and emotional state,” the CEO explained. “Private companies could know more about people than they know about themselves.” And, of course, so could governments, hacker spies working for the regime in Beijing, and even private-sector criminals with access to the surveillance data.

Weston claims that a smart city “doesn’t have to be as Orwellian as it sounds.” That is true. But considering governments’ track records on snooping — think NSA, KGB, Stasi, and so on — the likelihood of smart cities not ending up as Orwellian as they sound is probably slim to none. With the added “smartness” of emerging technologies, and with some two thirds of humanity expected to live in cities within a few decades, the possibilities for controlling and oppressing mankind in previously unimaginable ways are almost endless. Rulers will soon, if they do not already, be able to know more about the individuals they rule than those individuals know themselves.   

Of course, technology, in and of itself, is not the problem or the threat. Instead, the threat comes from totalitarian-minded governments, globalists, politicians, dictators, and bureaucrats anxious to further oppress the public and further empower themselves. From the UN and the World Bank to the Obama administration and the European Union super-state, the establishment is planning to bring “smartness” to a city near you in the near future. Based on their track record so far, however, it should be beyond clear that the “smart” cities are a dumb and dangerous idea — especially if you value liberty and privacy.

Alex Newman, a foreign correspondent for The New American, is currently based in Europe. He can be reached at

The New American