Domestic Surveillance and Spying, a Threat against Average Citizens

Both private companies and authorities are surveilling you and your children, using the data collected, sometimes very intimate data, and sending them to other intereessents.


Many types of instances are surveilling average citizens in any community in the world and recording data. The data is stored, analyzed and then used for own purposes, handed over to authorities or sold to third parties for proffit.  Instances that perform these actions or resceive the data for use are private companies, police, child protective agencies, secret services, social services, insurance companies, scientific institutes, health authorities and many more.

Objectives for this extensive data collection are typically such as: to protect children, to combat illness, for national and domestic security, for scientific use, to find the best advertizing targets for specific goods, for public planning, to develop company strategies and much more. Since the spying is performed in a hideous way the purposes are also poorly known in most instances, and objectives openly communicated may not be the real ones. Steadily more often they use the necessity for protecting the society from terror and children from abuse as an objective, and at the same time one tends to use absurdely wide defitions of terror and child abuse. Here is a survey of the most important contemporary domestic surveillance activities:



When you go to the supermarket or any other bigger store, the products and quantities you buy together with your bank account is read into the payment terminal and stored in the computer connected to that terminal. These data are then typically distributed to a third party that builds up a dossier about the buyng habits associated with your bank account. The third party then gets personal information about you and your family from the bank and identifies you as individuals. Based on your buying habits they then deduce a lot about the personal life of you and you family, including your children. The data is then distributed to cooperating instances, both authorities and private companies.



Most websites that give you free information or free cervices, for example online newspapers, Google, Youtube, Yahoo, are associated with spyware that register data about your activities, store them in a central and distribute them further to third parties. The script for these functions is typically loaded up by a basic script integrated in the page you are reading on. What the uploaded spyscript does, will vary from time to time, and can also be adjusted for the individual user. Based on what can be deduced about your interests, the website will also load up scripts to present adverts for individualized products and cervices. Probably data are also hideously collected by such services for authoriries.

Also most blogs or private webpages based on free systems like for example Wordpress contain scripts that upload spyware when you read or write at the blog. These systems will automatically place the script for uploading of the active spyscripts in the code when the blog or webpage is constructed. A developer with programming knowledge can of cource take that script out, but most forget to do it, or it is against the contract for use of the free development system to do it. When someone reads or writes into the blog or webpage, his activities will be recorded, and what is interesting will be distributed to third parties.



It is a wellknown fact that surveillance cameras with microphones are installed all around at public places like streets, stores, theatres, cinemas, hospitals, sport arenas and schools. There is a growing tendency to install such cameras also at places where intimate activities occur, like locker rooms and toilets, so that anything you do at those places is surveilled. Often the cameras at the most intimate places are hidden so you do not know that they are there, or are camouflaged as some other type of installation. What you or your children do at all these places is also videotaped and stored. These data is steadily more often analyzed and the most interesting things from these audiovisual data are distributed to third parties which most typically will be police, social servcises and child protective agencies.



Authorities do not restraint themselves from spying on citizens, and especially children,  even at places for the most private and intimate needs and actions. It has been amply revieled that a great many schools have surveillance cameras installed in the locker rooms and toilets the children use, so that one can record in detail what the children do at these places. Probably hidden spy equipment is installed even in the toilet equipment itself so that the bodily functions of children can be recorded.

The revelations have come forth by use of freedom of information acts. But there are always something in ayy community that is not covered by such acts, so one can surely deduce that hidden cameras not admitted is also installed to spy on the most intimate moments in the daily life of children.

So far most acounts are from UK, but it is a fact that USA, Canada, UK and Scandinavian countries extensively copy the practices regarding children, so be sure it happens worldwide.

This filming is surely used to analyse the intimate habits of children that the school find different from a strict normality scheme, at it is probably coordinated by some superior instances that use it, like the child protetive agenies and special polise units. If not coordinated and ordered by more superior agencies, so many schools have hardly dared to install spy equipment at these places.

If you go to google and type "cameras in children's toilets" you will find massive accounts of this expanding practice.



Drones that fly around high and low to record the activities of citicens are becoming steadily more commen, and these drones are typically used secretly so no-one knows about it. Must so-called UFO-sightings are probably due to sightings of such drones. They takes photos, perform videotaping and listen to wireless communications. They may also contain technology to interfere with such communications. Most typically they surveil districtwise, but are also used to surveil persons on individual basis. There is a growing tendency to especially survail children and their parents with drones. Such drones are most often operated by police units, but stedily more often privat companies, property owners, child protective agencies and social services use drones as a part of their arsenal, or buy services based on drone usage from providers of such survices.



In many societies the banks have been instructed to subject the use of your accaunts to a thight scrutiny, and any unusual activity pattern from what is common in the society, or any new pattern of use of your accounts trigger alarms that make the employees of the bank investigate you. If the investigation reveals even slight suspicion of some illegal activity, the bank is instructed to report you to authorities, and the bank has been given the permission to deny transactions or even block your acount totally from use on such circumstances. Banks have generally employed sophisticated software to do this spying and analyses, and you are not allowed to know what data the bank is collecting about you. This is at least the situation in the European Union and countries associated with the European Union.



Your telephone service provider or ISP prowider is constantly registering and storing data about all your connections and also store all messages you have resceived or sent. They can also store your voiced conversations if that is of interest. Traditionally the old data are erazed when the roll for the abonnent is full and new data is filled in, but steadily more some key data are stored permanently. These data are handed to authorities on a regular basis or after request. The provider will of cource also sell data about you to third parties that then will send you adverts based on what they can deduce about your interests.

Telephone companies also typically have permanent surveillance lines from their servers to police units so that the communication of spcific citizen can be tapped at will any time. In many countries there are moves to increase the bandwith of this surveiilance network by connecting such lines them to all local telecommunication link stations, and not only to central servers. The objective of this expansion is be able to surveil and record all communication to and from all citizens at all times. These activities are of cource regulated by law, but these vary between communities and often give the authorities wide privileges, and do not be sure that the authorities themselves abide to the law.



In June 2013 a former employee of FBI and of a contractor company working for NSA (National security agency), Eduard Snowden,  revealed through newspapers documents that prove that NSA surveil the communication of all customers of certain telephone companies and of services like Google, yahoo, Skype, AOL, Microsoft and Youtube. The documents were mailnly copies of approval from courts in the USA that they could freely take in data about whole groups of citizens. According to the documents the surveillance were massive regarding comunication crossing the border to USA, but somewhat unclear about the extent of surveillance of purely domestic communication.

It seems that the surveillance plan is working this way: The providers handle over to the NSA scheduled lists that identify all calls and all communication sessions and the people communicating. For people thay are especially interested in surveilling, they record in real time the calls and sessions and all data transfere during the calls and sesions, including voice and pictures. The surveillance is achieved through wires directly connected into the backbone servers of the providers. The system used by the NSA is identified with the name PRISM, but some or perhaps much of the data processing is probably done by proprietary software belonging to the providers, because the providers themselves perform surveillance in order to sell data about custoners and their cativities. Probably the providers are paid a rather huge revenue from the authorities for the the data they hand over.



When you or your children visit the family doctor, pediatrician, health center or hospital, or when your children have a physical exam in the school, you typically will deliver a urine specimen or it is taken blood specimens. These specimens will of cource be used to control traditional fysiological parameters, like hemoglobin, blood sugar, cholesterole and lipids. They are also often used to test you for use of illegal drugs, but also legal substances used in a way the society does not approve. Sometimes it is openly communicated that such tests are done, but often not. In addition it is possible to find out a lot more about you or your families lifestyle by applying specific tests to the specimens. The results of the tests are typically stored in central databases, and distributed to interessents that can be insurance companies, social services, child protective agencies, scientific institution and private companies.



If you, and especially your children are under anesthesia for some procedure, being tonsillectomy, dental work or whatever, it is a great chance that the staff or someone cooperating with the staff will do secret exams, take secret pictures, or take secret specimens, often of a very intimate kind, to find out as much as possible about you and your children. And what they find is used by all kind of community services, but perhaps especially the social services and the child protective agecies.

In many societies children are frequently sent to special exams to screen for sexual abuse or sexual behavior that the society does not approve. or to investigate observations that are interpreted as symptoms of sexual abuse. These exams are sometimes done secretly when the child is under anesthesia for some other reason, sometimes with the child awake. In many societies one has got to a situation where the authorithies nearly automatically suspect parents for abusing their children, and always suspect children that deviate some way from the social norm to be victims of sexual abuse. It does not matter for the society if the deviation is positive or negaive. For example will a child that is more intelligent than the average, and showing interests accoring to his or her intelligence nearly automatically be suspected for being an abuse victim.

During these exams they will take all kind of specimens, including specimens from all body openings and they will take intimate picture of the child. These data will be stored permanently and the data themselves or the interpretations made from the data will be distributed to interessents, like police, social services, the school, scientific institutions and child protective agencies.



The activities told about here are not done in every society in every country on Earth at equal extent, but be sure that this informationat least in some degree apply to the society where you live, and in many societies they apply in full extent, and regardless of the society is a democratic one or one that tends towards dictatorship. In all societies there are of cource laws that regulate surveillance of this kind, but the laws are invariably constructed in such a way that certain authorities have nearly full privilage to spy at you or your children with any type of means. The authorities that have the greatest privilages, are usually not the ordinary police, but more often child protective agencies, the school system and social services.


Knut Holt is a business and market consultant that also is interested in science, health, fitness and sexual issues. Please go to his website to find information and smart products to improve fitness, increase sexual satisfaction and help against common health problems. You can also find information and products in the fields automotive, electronics RC models and hobby.

You can freely copy and distrubute this article, as long as the author's link is present in a well visible form.