February 12, 2013
Raytheon “is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world.” The corporation provides “state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services.”
The latest surveillance tool developed by Raytheon is called Rapid Information Overlay Technology (RIOT) which is “capable of tracking people’s movements and predicting future behavior by mining data from social networking websites.”
Jared Adams, spokesman for Raytheon’s intelligence and information systems department, stated: “RIOT is a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into useable information to help meet our nation’s rapidly changing security needs. Its innovative privacy features are the most robust that we’re aware of, enabling the sharing and analysis of data without personally identifiable information [such as social security numbers, bank or other financial account information] being disclosed.”
In 2010, as part of a research initiative, RIOT was being tested by the US government and industry partners to create a national security system that would analyze “trillions of entities” on the internet.
Steve Hawkins, vice president of information security solutions at Raytheon said: “Analytics is the key to outmaneuvering our adversaries in the face of the staggering volume, variety and velocity of information in cyberspace.”
RIOT will create a profile on any individual based on information inputted into social media sites and could be used to anticipate how that particular person will act in the future.
Using location analysis of photographs posted by users, Brian Urch, principle investigator for Raytheon, says that a precise longitude and latitude can be deciphered because those coordinates are embedded by smartphones within “exif header data.”
By displaying a spider diagram, an individual’s associations and “relationships” that are connected to through information provided by Facebook and Twitter, data is mined by RIOT and translated into graph form for easy tracking.
Because social media sites are not forth-coming about what data they share with federal government and law enforcement agencies, Ginger McCall, attorney for the Electronic Privacy Information Center explains: “Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the RIOT search.”
The National Security Agency (NSA) revealed the Perfect Citizen (PC) program that “would employ sensors in computer networks that would be activated by unusual activity. Allegedly, the program would not monitor computers persistently.”
In Bluffdsale, Utah the National Security Agency (NSA) are erecting a one million square feet complex for collecting data on American citizens. This complex is costing American taxpayers $2 billion dollars. Essentially, we are paying for the US government to spy on us.
According to an email obtained by mainstream media, “prefect citizens is big brother” and Raytheon was championed as heading this project with a defense contract worth $100 million.
PC was intended to preform vulnerability assessments of the US government’s digital infrastructure. However the NSA planned on using the software to intervene against cyber-attacks to government agencies, private corporations, utilities corporations, nuclear power plants and transportation.
Google’s relationship with the federal government was ruled as none of the business of the private citizens in June of 2012.
Prior to this ruling, Google was involved in a violation of wire-tapping laws by stealing private citizen’s personal data through their unmanned vehicles called “street view” cars.
Google’s Android has the ability to use ambient background noise of an individual’s environment to spy on them. Their activities will be targeted to more efficiently advertise to them through their technological devices.
Google will use your private conversations, music preferences, favorite shows and radio stations – anything in your immediate environment to build a profile on you. Thanks to Google’s Android and similar smartphones the patent for this surveillance technology will allow our phones to become spies.
According to the Twitter “The Transparency Report” released in 2012 the US government has made requests that are infringing on American privacy rights. Twitter states that “we’ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.”
As the US government sifts through the tweets US citizens are making and analyzing information from illegal means, there are decisions about particular citizens being made to justify the construction of an all-encompassing Big Brother network.
While data mining, cell phone corporations are using mobile phone habits to decipher the predictive movements of users. Scientists from the University of Brimingham in the UK have revealed that they can predict the movements of mobile phone users through tracking the network usage in real time with algorithms that forecast probabilities. This means that cell phone corporations, if using this system could predict the future whereabouts of their customers at any time of the day or night.