Gangstalking Surveillance and an Introduction to Community Policing Technology
Surveillance is one of the primary methods used to track and monitor targets, facilitated through the interconnected networks of what can only be described as the mindless followers we call "perps." These underdeveloped, Darwinian creatures aren’t just bowing to Big Brother, organized crime, and local police because they are spineless—they are actively contributing to the creation of the very surveillance systems that track individuals.
We are all familiar with the technology our governments use daily, such as facial recognition at airports and, soon if not already, at all U.S. and Canadian border crossings and vehicle checkpoints. Local and state police also use Automatic License Plate Recognition (ALPR) systems while scanning vehicles on the road. Most of these systems are passive, meaning they collect, store, and analyze data without immediate action being taken at the site. For example, Ring's community meshing system, particularly through its Neighbors app, allows users to share video footage of their surroundings, including people, vehicles, and license plates. This creates a network where users can track movements and activities within their neighborhood. When combined with geolocation features, users can upload footage tagged with specific locations, making it easier to track individuals or vehicles as they move through different areas. This interconnected system creates a surveillance web where users and law enforcement can actively monitor activities, contributing to a sense of collective security, but also raising concerns about privacy.
The integration of facial recognition technology with Ring, though not directly part of the system, can further enhance this surveillance mesh. As Ring captures video of people entering and leaving properties, this footage can be shared within the community, and when combined with facial recognition software (used by third parties), individuals can be identified and tracked across different locations. This can be used for targeting individuals based on their movements or associations, potentially linking them to specific activities or neighborhoods.
Similarly, license plate tracking is an active feature within the Ring ecosystem when users share videos of vehicles in their area. Ring cameras can capture images of vehicles and their license plates, which can be shared in the Neighbors app. With enough footage of the same vehicle across different locations, it becomes easier to track that vehicle's movements. This kind of data can be used to target individuals based on the repeated appearance of their vehicle in certain areas, potentially subjecting them to increased scrutiny or surveillance, even without their knowledge or consent.
Nextdoor:
Nextdoor is a social media platform that connects neighbors and communities. It allows users to post about local events, crime reports, and safety issues, and exchange information about suspicious activities. Though Nextdoor primarily focuses on social interaction, it also serves as a community-based surveillance tool where users share video footage from personal security cameras, photos, and details about incidents happening nearby. This can create an informal but active watch system, often used by law enforcement to gather leads, track patterns, or issue warnings.
Flock Safety
is a company that provides advanced surveillance solutions, particularly through its Flock Safety Cameras, which are used to monitor vehicles and track movements in real-time. These cameras, often installed in high-traffic areas, such as neighborhoods, intersections, and business zones, collect data through Automatic License Plate Recognition (ALPR) technology.
FedEx trucks, like many other delivery vehicles, are often tracked using systems like Flock. Flock's cameras can capture the license plates of FedEx trucks as they enter and exit certain areas. This data is then uploaded to a central database, where it can be cross-referenced and flagged for various reasons, such as ensuring packages are delivered to the correct locations or identifying the movement of these vehicles in areas where criminal activity has been reported.
The key feature of Flock’s system is that it allows police and other authorities to access this collected data remotely. For instance, law enforcement can use the Flock network to monitor FedEx truck movements in real-time or look back at historical data to track where these trucks have been. This creates a web of surveillance, where FedEx vehicles, alongside other vehicles, become part of the larger data pool being tracked and analyzed.
In some cases, this information is also used for investigative purposes. If there is a crime or a traffic incident, authorities can check if a FedEx truck was near the location, providing additional evidence or leads. While the use of Flock and similar systems has sparked concerns about privacy and over-surveillance, they are increasingly being implemented in many communities and businesses for security and law enforcement purposes.
Community Watch Programs:
Traditional Neighborhood Watch programs have expanded with digital tools, allowing neighbors to communicate more easily through apps and social media. These community watch systems allow for real-time reporting of suspicious activities, with many programs integrating apps or platforms where people can upload photos, videos, and license plate numbers. By combining real-time information sharing with digital monitoring, these systems create an interconnected network of eyes on the street, increasing surveillance and often leading to faster identification of suspects.
Citizen Reporting Apps:
Many cities and municipalities have adopted citizen reporting apps that allow residents to report crime, suspicious behavior, or even traffic violations in real time. These apps often allow users to upload pictures, videos, or descriptions of incidents that contribute to community surveillance efforts. In some cases, these apps also have geo-tagging and time-stamping features, which can be used to track individuals, vehicles, or incidents as they happen.
Drone Surveillance:
In some areas, drones are used by communities or local law enforcement to monitor public spaces and neighborhoods. These drones are equipped with cameras capable of capturing high-definition images or video, and they can be controlled remotely to survey large areas. In some cases, drones have been integrated into community watch programs, with citizens or local authorities using them for real-time surveillance of high-risk areas.
Public CCTV Networks:
Many cities have established public CCTV networks, often in collaboration with law enforcement agencies, to monitor public spaces such as parks, streets, and transportation hubs. These cameras often capture facial images and vehicle license plates, contributing to public safety surveillance. While not necessarily community-driven, these public systems can be accessed by residents through local apps or partnerships, allowing them to become more aware of what is happening in their neighborhoods and potentially leading to more active community involvement in monitoring.
Phone apps are deadly today
The app "I'm Safe" is designed as a personal safety tool to help individuals quickly and easily send alerts to their contacts or emergency services if they feel threatened or unsafe. While there are several apps with similar names and purposes, the general idea behind apps like "I'm Safe" is to give users peace of mind by providing a simple and effective way to request help in potentially dangerous situations.
Here are some features commonly found in apps like "I'm Safe":
1. Emergency Alerts:
The app allows users to send emergency alerts to predefined contacts, such as family members or friends. These alerts often include the user's current location, enabling responders to quickly locate them. Some apps may also have a feature to send automatic updates if the user is in motion or unable to manually check in.
2. One-Touch Alerting:
Many personal safety apps, including "I'm Safe," offer a one-touch alert button that can be activated in a panic situation. This makes it quick and easy for users to send an alert without needing to open a full interface or type a message.
3. Location Tracking:
The app may use GPS to track the user's location and share it with emergency contacts or authorities. This feature ensures that the person's whereabouts are known in case they need help. Some apps even allow for real-time location tracking, so contacts can follow the user’s movement.
4. Silent Alerts:
For situations where it’s dangerous to make noise or draw attention, many apps provide a silent alert feature. The user can discreetly send an emergency message without triggering suspicion, often by pressing specific buttons or gestures on the phone.
5. Check-In Feature:
Some versions of personal safety apps include a check-in feature, where users set a timer to send an alert if they don’t check in at a certain time. For example, a person might set a check-in time when walking home at night. If they don’t respond by the set time, the app will automatically send an alert.
6. Integration with Law Enforcement:
In certain regions, apps like "I'm Safe" may allow users to directly contact law enforcement or emergency services with a button press. This can expedite the response time in critical situations.
7. Share Status:
Some apps enable users to share their status with their contacts or social media in real time. This can include the current situation, location, and level of danger, so others can be informed.
8. Safety Tips and Resources:
Many safety apps also include helpful resources such as safety tips, emergency contacts, or links to local shelters and crisis centers. This can be particularly useful for individuals who are experiencing domestic violence, stalking, or other forms of harassment.
Overall, apps like "I'm Safe" are designed to provide a sense of security, offering quick access to emergency features in potentially dangerous situations. While the specific features of each app may vary, their primary goal is to give users a tool for personal safety that helps them stay connected with loved ones and emergency services when needed.
Can it be used to Track a Target?
While "I'm Safe" and similar personal safety apps are designed with the intention of helping users in emergencies and providing a sense of security, they could potentially be used for targeting or tracking individuals under certain circumstances, especially if the app’s features are misused or compromised.
Here are some ways these apps could be exploited for targeting or tracking:
1. Location Sharing:
One of the core features of apps like "I'm Safe" is the ability to share your location with designated contacts. While this is beneficial for safety, if a person’s contacts are not trustworthy, or if someone gains access to the app or its data, they could use this information to track the user’s movements. For example, if an individual shares their location with a partner or friend, that person could continuously monitor their whereabouts, potentially using it for harassment or stalking.
2. Check-Ins and Notifications:
If the app includes features like check-ins or automated alerts for when a user doesn't respond within a set time frame, it could be used to predict a person's routine or movements. If an individual becomes aware of a user's check-in schedule, they could potentially exploit this knowledge to track when the person is at a specific location or when they might be most vulnerable.
3. Real-Time Tracking:
Many safety apps allow real-time location tracking, which is helpful in emergencies. However, if this feature is used maliciously or without the user’s knowledge, it could allow someone to track a person’s location at any given time. In some cases, apps may allow users to share their real-time location with others, which could lead to misuse if the shared contacts are not trusted or if the location is accessed by unintended parties.
4. Weak Security or Data Breaches:
Like any app, if security measures are not properly implemented, there’s a risk that hackers or malicious individuals could gain access to users’ location data. This could lead to tracking a person over time, potentially without their consent. If the app stores sensitive data such as location history, it could be accessed through a breach, enabling unauthorized tracking.
5. Misuse by Abusers or Stalkers:
In cases of domestic violence or stalking, abusers might encourage their victims to use such apps or might force them to share location data, allowing the abuser to track their movements. The app’s real-time tracking feature can be used to monitor a victim's actions, leaving them vulnerable to further harm.
6. Over-Use of Shared Information:
Some apps also allow sharing of other information, such as alerts or status updates. If this information is shared publicly or with a broad network of contacts, it could be used to gain insight into a person’s behavior, schedule, or location. For instance, frequent alerts about a person’s presence at specific locations could allow someone to target or follow them more effectively.
Protecting Privacy:
To prevent these apps from being used to track or target individuals, it’s essential to follow privacy guidelines such as:
Limiting the contacts who have access to location-sharing features.
Regularly updating security settings and reviewing permissions.
Turning off real-time tracking when not needed.
Using encryption and other security measures to protect data.
Reviewing app privacy policies to understand how data is handled and shared.
In summary, while the primary function of apps like "I'm Safe" is personal safety, their features, if misused, can potentially lead to unwanted tracking or targeting. Ensuring proper security settings, limiting who can access shared information, and remaining cautious about how location data is used can help mitigate these risks.
The enactment of the USA PATRIOT Act and Canada's "First Act" (often referring to Canada’s Anti-Terrorism Act or similar pieces of legislation) has played a significant role in enabling mass surveillance. These laws, passed in the wake of the September 11, 2001 attacks, expanded government powers and allowed for the increased surveillance of individuals, groups, and communications.
USA PATRIOT Act:
The USA PATRIOT Act, signed into law in 2001, granted U.S. government agencies, especially the FBI and NSA, sweeping powers to monitor and intercept communications, track financial transactions, and collect personal data without the same level of oversight as before. Some of its most notable provisions included:
Increased surveillance capabilities: The law expanded wiretapping and electronic surveillance, allowing authorities to monitor phone calls, emails, and other communications under the guise of national security.
Data collection: The act allowed for the collection of vast amounts of data from U.S. citizens and foreign nationals, including through the controversial use of metadata, which can be used to track movements and interactions without the need for probable cause or judicial warrants.
Expanded reach for intelligence agencies: Intelligence agencies gained broader authority to conduct surveillance both within the U.S. and internationally. This facilitated mass data collection, including the monitoring of citizens' private activities under the justification of combating terrorism.
This law significantly increased the capabilities of the U.S. government to engage in mass surveillance, often bypassing traditional privacy protections. In practice, this allowed the government to monitor individuals without having to establish direct links to criminal activity, leading to concerns about overreach and violations of civil liberties.
Canada's Anti-Terrorism Act (Bill C-36):
Similarly, Canada's response to the 9/11 attacks included the Anti-Terrorism Act, which was passed in December 2001. This legislation gave Canadian authorities broader surveillance and investigative powers to counter terrorism. Key aspects of the act included:
Enhanced surveillance powers: Like the USA PATRIOT Act, the Anti-Terrorism Act allowed for increased surveillance of communications and the ability to track financial transactions. This expanded the government's ability to monitor individuals' movements, associations, and communications, all in the name of countering terrorism.
Preemptive action: The act also provided powers for preventive measures, such as the ability to detain individuals without charge if they were deemed a security threat, further enabling surveillance and control.
Coordination with international efforts: Canada's Anti-Terrorism Act also aligned with international counterterrorism efforts, including information sharing with global intelligence networks. This contributed to the creation of broader surveillance systems where personal data, including communication records, financial transactions, and travel histories, could be accessed and shared across borders.
Enabling Mass Surveillance:
Both the USA PATRIOT Act and Canada's Anti-Terrorism Act empowered governments to use technology and information-sharing practices that facilitated mass surveillance. While these laws were intended to protect national security, they also raised serious concerns about privacy, the erosion of civil liberties, and the potential for abuse. The increased data collection, expanded surveillance powers, and ability to access private information allowed authorities to monitor large swaths of the population, far beyond suspected terrorists or criminal groups.
These laws were instrumental in creating a surveillance landscape where citizens' activities could be tracked more easily, data could be collected and analyzed on a massive scale, and security agencies had access to personal information under broader definitions of national security threats. The legacy of these acts is seen in the expansion of surveillance infrastructure, like ALPR (Automatic License Plate Recognition) systems, facial recognition technologies, and other data collection tools that track and analyze individuals' movements and behaviors.
In essence, the passing of these laws marked a shift towards greater government surveillance, often justified by the need to combat terrorism but raising critical questions about the balance between security and privacy.