Although many people seem to ignore it, including important libertarian sectors,
we live in the capitalist era of surveillance and population control. With it,the states deprive us of freedom and try to frighten the social movements. On theother hand, corporations exploit us by collecting our data to enrich themselveswith it. This surveillance and control affects us at all times. In order not tobe complicit or to let ourselves be intimidated and prevent surveillance, it isnecessary to fight against repressive measures and use devices and messages safely.States and companies monitor and control us in its stage of decadence andbarbarism, capitalism and its minority in power have subjected us to a brutaldeprivation of civil liberties through surveillance and social control. Theyrecord in real time all the content and metadata of the communications that takeplace in any country. The information they record reveals what we say or do ineach moment, as well as the links and associations between people. The newinformation and communication technologies have served for the states toimplement an infrastructure that allows total social control . This statesurveillance has a long history of repressing social movements.Corporations (Google, Apple, Facebook, Amazon, Microsoft, telephone companies,etc.) subject us to enormous surveillance and permanent tracking of our behavior,to carry out massive collection and analysis of large amounts of information.Thus, all Google company services are designed for massive data extraction. Inthe Gmail email accounts it so "generously" offers, the terms of use say thatGoogle reserves the right to scan and store the content of the emails, even afterthe user deletes them or cancels the account. Google Maps and Google Earth werefunded by the CIA's In-Q-Tel program, which is the most powerful spy agency inthe world.Surveillance and control of people in real timeThe smartphone was created with the purpose of permanently monitoring andcontrolling people. Not only does it record conversations, it records images andsound without our consent and has at least four geolocation systems. Because themost valuable thing about a person is their geographical position at all times.Google's Android operating system is installed on 80% of the world's mobilephones. People usually carry the mobile with them and keep it on almostpermanently. It has two cameras, an average of fourteen sensors and at least fourgeolocation systems. In addition to GPS, the Wi-Fi card of a mobile phone has twopositioning systems: The RSSI that indicates the intensity of the receivedsignal, measures it in a wireless network environment and compares it with adatabase of Wi-Fi networks to connect to the closest. Fingerprint is the mostused positioning algorithm and is based on the map of Wi-Fis that we havepreviously connected to. Bluetooth emits short-distance signals to connect toother devices giving information about the phone. Almost all internet deviceswork via bluetooth.The phone's SIM card constantly sends a signal to the nearest cell towers everyfew seconds to receive service. Telephone operators know how far away the user isusing Cell ID technology. The greater the density of antennas, the greater thelocation accuracy of everything that happens in its domain range. That is, theyknow all the mobiles that pass through the radius of an antenna. This techniqueis known as cell tower dump. It allows governments, for example, to identify allthe people who are attending a demonstration by their mobile number. But it isalso used by marketing companies and to sell the information they monitor in realtime to insurance companies, car dealers, etc.Another surveillance and control technique used by governments is based on adevice known as StingRay or IMSI-catcher that tracks all mobile phones around.The police use it in their helicopters and vehicles to find out in real time whois in a demonstration or who is inside a building.All applications that use GPS know where we are at all times. The same as thetelephone operators if there is coverage. Disabling geolocation services does notprevent companies from locating users. When they do not have access to GPS,Google and Facebook locate the mobile thanks to the Wi-Fi card and the IP address.They use our personal data, information from our emails, the sites we visit whenbrowsing the Internet, etc., to trade with them.Those who are dedicated to spying know that the most valuable piece ofinformation about a person is their geographical position . Knowing at everymoment of your life where you are, they know where you live, where you work, howmany hours you sleep, when you go for a run, who you hang out with, where youtravel, how you get from one place to another, in front of which shop windows youstop What stores do you shop at, do you take drugs, take contraceptives, do yougo to church, to concerts, to fast food restaurants. They know who she likes andwho she tries to avoid, who she has lunch and dinner with, how much time shespends with each one, and where she goes next. They know if he has a lover, if heplays sick, if he bets, if he drinks. They may even know things that the personhimself does not know, such as his unconscious routines and their subtlecorrelations. a smartphoneit tells all these things to the applications insideit, a bottomless gold mine for the industry[1]that uses and develops informationand communication technologies, that is, surveillance and population control toenrich itself.Mobile sensors monitor and control usIn addition to geolocation, smartphones have a series of sensors. The camera andmicrophone are the eyes and ears of the phone, but it is impossible for the userto know when they are working and who they are communicating with. There areapplications, such as virtual assistants built into 4G smartphones, that performa permanent listening function. Apps can turn the camera and microphone on andoff without permission, record images and sound, send them to a server, andstream them. They can also take photos and videos of the fingertips that touchthe screen (they collect the fingerprint) or of faces to send them to a serverwhere a facial recognition algorithm enters or compares them in a database. Thegyroscope records the position and orientation of the phone and knows what we aredoing with it (turn it horizontally, write, take a photo or watch a video...);where is it (in the pocket or bag). The accelerometer measures the speed and thedirection in which we move, whether we are walking, cycling, driving... Themagnetometer is a metal detector, in addition to measuring magnetic fields andcompass on maps. It also has light, infrared, ambient light sensors, etc.A team from the University of Newcastle demonstrated that with the data from thesensors, even the passwords that the user types, either in the applications or inthe browser, can be extracted. According to a study by the University of Oxford,90% of apps on Google Play (on Android phones) share the data they collect withGoogle. Half of the apps share their data with third parties that typicallyinclude Facebook, Twitter, Microsoft and Amazon.They are enriched by our informationSo there is a growing number of companies that, from the applications they giveaway, extract information from hundreds of millions of mobile phones to analyzeit, sell it to their advertisers or both. That is, they treat us like a commodity, where the form of exploitation is so refined that they don't even pay us forexploiting us anymore . And this exploitation is the main source of enrichmentfor companies like Google, Facebook, Twitter, etc. The surveillance and controlof these companies is as serious as state surveillance, since they have achievedunprecedented power over the population .Yes, indeed, they sell us to the highest bidder: Either by selling theinformation to other companies, using it for advertising purposes to increasetheir effectiveness, or as a bargaining chip to collaborate with stateintelligence agencies to monitor and control us. Telephone companies providegovernments with records of telephone conversations.For years Google (Gmail), Microsoft (Hotmail, Outlook), Amazon, Yahoo, etc.,through the PRISM program, have allowed the US National Security Agency (NSA).mail from its users[2], just as the social networks Facebook and Twitter allow.In turn, the NSA shares this information with the security agencies of othercountries, in Spain with the National Intelligence Center (CNI). WhatsApp andTelegram are also today programs for mass surveillance of people through mobilephones.With 5G mobile technology, everything will be much worse , with almost unlimitedaccess to personal life, as is already happening in China, where there is abrutal degree of permanent surveillance and control.Digital gag decreeIn 2013, the journalist Glenn Greenwald revealed that the NSA recorded allelectronic communications from around the world (including Spain), as evidencedby the documents he had received from his source, Edward Snowden. He knew thisbecause he worked at the NSA.In Spain, the Sánchez government's Digital Gag Decree (RD14/2019)[3]is the toolimposed to legalize a covert practice of surveillance and social control that hasbeen carried out for years, including the one carried out by the NSA in Spain andshares with the CNI. This norm, which enables surveillance and censorship withimpunity, is the greatest attack against freedom of expression and the right tobe informed and to communicate . As its article 6 says, it allows "the directmanagement or intervention of electronic communications networks and services" .And add that"may affect any infrastructure, associated resource or element orlevel of the network or service that is necessary to preserve or restore publicorder, public safety and national security" .This norm imposed by the PSOE (the left of the Popular Party), is more repressivethan the Francoist Press and Printing Law of 1966. Its measures "will be adoptedby the Government on its own initiative." Which means that the currentPSOE-Podemos Government can arbitrarily and in 24 hours, close or intervene anywebsite, email account, telephone line, confiscate telephones, computers andservers, etc., without notice and without judicial guarantees. The executing arm,via online and in real time, will be the State security forces and bodies. Therepressive measures and deprivation of liberties of this rule will be enshrinedand amplified when the preliminary draft of the General Telecommunications Law istested[4]which, in addition, opens the doors to the unrestricted use of 5G in Spain.Passivity or fight against surveillance and controlBut this brutal degree of surveillance and capitalist control, which preventsindividual and collective freedom, is only possible due to the passivity andunawareness of a large part of the population in the use of online electronicservices and devices. Passivity and unconsciousness that also occurs in broadanarchist and anarcho-syndicalist sectors. This may bother and worry some people,despite the fact that it affects two inalienable libertarian principles: thefight for freedom and the fight against all forms of exploitation .The truth is that there are many people who continue to ignore, for example, thedegree of surveillance and control through mobile phones, or that every emailmessage sent unencrypted over the network is intercepted by intelligenceagencies. Passivity and unconsciousness must be abandoned in order to resolutelyoppose and fight against all forms of surveillance and control, whether by theState or by companies. Only our determined struggle through direct action is theway to prevent exploitation and win our rights and freedoms.As promoters of the social revolution, it is also our responsibility to apply anddisseminate the best security practices before the State. We must know andeffectively use encryption tools and techniques to anonymize. We must also knowour adversary: How phone calls are intercepted, that a secure line ofcommunication must be protected on both sides, that an encrypted email message isonly as secure as the words we put in the subject, etc.Struggle for freedom (individual and collective)If we allow companies and state security forces to monitor and control us throughdifferent electronic devices (mobile phones, tablets, computers...), we are NOTfighting for freedom, but by consenting to it we are accomplices .When we accept an insignificant gift (be it an email account, an account in anyof the social networks, a certain space in the cloud or an app), we are giving upour privacy and freedom . Behind that tiny gift hides a depersonalized machinethat records, filters, processes and analyzes all our movements.Fight against all forms of exploitation (individual and collective)When these companies offer us something for free, it is because we are themerchandise and our data is the product that they want to exploit. They arecompanies whose business model depends on user data. If we allow them to get themand exploit us as a free commodity, we are NOT fighting against capitalistexploitation , but by collaborating we behave like slaves .Let's not be fooled: The best way to protect user data is not to have it.Grades:[1]Marta Peirano, The enemy knows the system, chapter 3. Surveillance,https://www.epublibre.org/libro/detalle/50407[2]Glenn Greenwald's book, Snowden, without a place to hide reveals a lot ofinformation (in which Spain is involved) and can be downloaded at this linkhttps://epublibre.org/libro/detalle/18859[3]https://mega.nz/file/Nd1UXBAD#GnUYGDbQ-YpL1yCi_wdiO9jHedb90n-iSmBD6nK_tHQ[4]https://avancedigital.gob.es/_layouts/15/HttpHandlerParticipacionPublicaAnexos.ashx?k=16842janushttps://levantecntait.wordpress.com/2022/03/07/luchamos-contra-la-vigilancia-y-control-masivos-i/_________________________________________A - I N F O S N E W S S E R V I C EBy, For, and About AnarchistsSend news reports to A-infos-en mailing listA-infos-en@ainfos.caSPREAD THE INFORMATION
Any information or special reports about various countries may be published with photos/videos on the world blog with bold legit source. All languages are welcome. Mail to lucschrijvers@hotmail.com.
Autobiography Luc Schrijvers Ebook €5 - Amazon
Search for an article in this Worldwide information blog
Abonneren op:
Reacties posten (Atom)
Geen opmerkingen:
Een reactie posten