ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

When Security Becomes a Trojan Horse

Updated on February 24, 2016
Buildreps profile image

Mario Buildreps is a graduate engineer. Become aware of topics in a way you have never heard before.

Source

I think Security is

See results

What is Security?

Security can be related to several subjects:

  • protection of a person(s) / population,
  • protection of a building(s) / organization(s),
  • protection of information,
  • protection of a country.

Primarily is security meant to prevent harm to, or robbery and damage of the above subjects.

Secondly, is security increasingly used as a mean to identify suspects after they've committed an offense by looking back recorded video.

There seems not much wrong with this at first hand.

From Wikipedia

A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth

How gifts can turn to be a nightmare.
How gifts can turn to be a nightmare. | Source

About Private Security Contractors

Private Security Contractors, shortly PSCs, is booming business. Part of this business became PMCs, Private Military Contractors. It's one of the most steadily growing businesses, showing a constant annual growth of 7 to 8% over the last 30 years. In many countries PSCs employ more personnel than the police.

The PSCs business accounts annually for nearly 300 billion US$ (2014), and employs worldwide 25 million security guards.

Some of these companies can be classified as extremely militant, like Triple Canopy and ACADEMI that are involved in violent military operations.

The global trend towards downsizing of governments, including public security institutions, has contributed to the growth of the private security sector.

Who is holding the most guns? The monopoly on violence is shifting from government to businesses. Democracy is becoming increasingly a Corporatocracy.

PSCs becoming Mercenaries - PMCs
PSCs becoming Mercenaries - PMCs | Source

Most Used KPI's in Security Industry

KPI stands for Key Performance Indicator. Every professional industry uses KPI's to monitor targets.

The main goal of any security company is to decrease responsive actions and to increase proactive actions. Proactiveness cuts costs and prevents the related negative events to occur.

We see two things happening at the moment:

  • the monopoly on violence is shifting from government to businesses,
  • the actions are shifting from responsive to proactive.

What are the consequences? That businesses, based upon automated algorithms, will determine who in the public arena is showing suspicious behaviour.

PSC'ers in Warzones in Relation to Soldiers

The use of guns by Private Security Companies in wars is steadily growing, and is now 1:1. That means for every soldier with a gun stands PSC'er with a gun.
The use of guns by Private Security Companies in wars is steadily growing, and is now 1:1. That means for every soldier with a gun stands PSC'er with a gun. | Source

more than 50 per cent of all contracts are not subject to any monitoring to ensure the performance of suppliers with contract terms

— David Isenberg - author of Shadow Force

Suspicious Behaviour

Rapid developments of video analysis techniques give increasingly the ability to identify suspicious behaviour pro-actively, and give the ability to act before any negative event occurred.

The video analysis technology is still in its infancy. The current algorithms are capable to:

  • recognize suspicious behaviour,
  • count persons and vehicles,
  • recognize left luggage or packages,
  • recognize faces.

Is there something wrong with this? Well, that depends what you define with suspicious behaviour.

The definition of suspicious behaviour depends on the ones who are in power. And that is something that is not chiselled in granite.

This map of Amsterdam shows the distribution of Jews in 1941. Every dot represents 10 Jews.
This map of Amsterdam shows the distribution of Jews in 1941. Every dot represents 10 Jews. | Source

History Always Repeats Itself

Can you recall what happened during the Nazi oppression? Jews, Gypsies, Jehovah's Witnesses, homosexuals and mentally handicapped were systematically traced and exterminated.

Let's look at the Jews. The Jews were nota bene themselves responsible for the purchase and distribution of badges - the Star of David. When a Jew was caught not wearing a star, then he/she ended up in jail or shot dead on the spot.

So, this distribution of stars seemed to be a social action. But they didn't knew the other consequence of wearing the Star of David at that time. Or did they?

A Jew was a suspect. The crime during the Nazi regime was being a Jew. That is in our Democracy no crime anymore. Crimes are only related to current ruling power.

Over-active officials were also good in registering Jews in the town archives, which made the job of the Nazi's much easier. Registration was the only way to separate the wheat from the chaff.

Do you see?

Top 10 countries with the Highest PSCs rates

(click column header to sort results)
Rank  
Country  
Percentage  
PSCs Employees  
Inhabitants  
#1
Hungary
1.05%
105,121
10,013,628
#2
Guatemala
0.94%
120,000
12,710,000
#3
Panama
0.93%
30,000
3,232,000
#4
Honduras
0.87%
60,000
6,893,000
#5
South Africa
0.81%
387,273
48,073,000
#6
Brazil
0.75%
56,486
7,576,751
#7
United States
0.66%
2,000,000
302,741,000
#8
India
0.62%
7,000,000
1,130,618,000
#9
Jamaica
0.56%
15,000
2,668,000
#10
Australia
0.56%
114,600
20,395,000
Source: smallarmssurvey.org most figures are of 2011.

The Use of Firearms by PSCs

Just a few countries prohibit the use of firearms by PSCs on their territory - including Denmark, Japan, Kenya, the Netherlands, Nigeria, Norway, and the UK.

In some countries PSCs are allowed to use fire-arms only for specific operations. In China and France, for instance, PSCs may legally carry firearms when escorting money to and from banks.

Countries that legalized for PSC's to carry a gun, have no official information on what percentage of personnel normally carry a gun. Based upon the fact that guards may share firearms between shifts, it is estimated that two million of the PSC's in the US have access to a gun.

Worldwide have PSCs access to 3 million legal firearms, and since firearms can be shared between shifts, with a ratio of 1:4, 12 million PSC's have access to a gun. The heaviest weapons that PSC's are usually able to use is the legendary AK-47.

Gathered Information in the Public Domain

The second largest private employer in the world behind WalMart is G4S, which for example, acquired recently Armorgroup that runs a 10,000 men strong army. This is not just an average neat company. It is even paid with tax money.

It is astonishing to see that just a handful very large companies control our 'security' worldwide. The 6 largest PSCs gather about 70% of all the video data around the world.

These 6 big ones operate more than 200 million cameras of the total estimated 300 million surveillance cameras worldwide (2014). There is not one cosmopolitan who is not catched on one of the cameras of these companies, meaning that your data is stored many times in datacenters.

It will be such a disadvantage not to have the implant that it will essentially not be optional

— Dr. Mark Gasson (cybernetics scientist)
The RFID chip compared to a grain of rice.
The RFID chip compared to a grain of rice. | Source

How Safety Becomes a Trojan Horse

You will probably say - and so what? Can you recall what you did on just a random day a month ago? Or the day before that? No, you cannot, but these cameras can.

Within a few years cameras will be equipped with chip scanners. Once people, like animals (which we are now used to), have a RFID microchip implanted, there's no escape from the systems behind these cameras identifying you everywhere. If you feel OK with this, you're nothing more than cattle.

Around 2020 will be most people used to the idea of many new smart technologies, and start to have a chip implanted. Ignorance obtains for ease at customs control, or any other convenience that comes with this chip implant, maybe in connection with their 'smart' devices.

The cameras that have become behaviour/tracking devices are then able to distinguish you including your behaviour. You will not be able to walk freely on this planet anymore. Do you see? Or not?

By that time, the corporatocracy has the

  • information,
  • guns,
  • monopoly on force.

Remember what happened in WWII, with the difference that the target groups are yet unknown to us.

Beware of Trojan Horses!


© 2015 by Buildreps

Comments

    0 of 8192 characters used
    Post Comment

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      Thanks for the comment, torrilynn.

    • torrilynn profile image

      torrilynn 

      3 years ago

      I feel as if security is necessary for things such as protection of information, the country, people, places, etc. I don't like the idea of a microchip being implanted into my skin and I wouldn't willingly let someone implant one into me. Overall, great information and a well constructed hub. Best of wishes.

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      That's for sure peachpurple, the world becomes every year increasingly more complicated. Thanks for your comment!

    • peachpurple profile image

      peachy 

      3 years ago from Home Sweet Home

      wow, I thought that a CCTV is just for houses and offices but the real world is more complicated

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      Thanks for commenting, Writer Fox. We are indeed used to the idea of chip implants in domestic animals, so the step to do this in people became smaller.

    • Writer Fox profile image

      Writer Fox 

      3 years ago from the wadi near the little river

      These are some very scary thoughts about chip implanting. This is done with dogs and cats already, so we know how the process works.

      Voted up and interesting!

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      Thanks for dropping by, AliciaC. The future is of course not set yet, but it surely tends to go in that direction.

    • AliciaC profile image

      Linda Crampton 

      3 years ago from British Columbia, Canada

      This is an eye opening and thought provoking hub, Buildreps. Thank you for sharing the important information.

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      Thanks for your comment, ChitrangadaSharan. We became certainly used to security. But the developments will continue and increasingly influence our daily lives.

    • ChitrangadaSharan profile image

      Chitrangada Sharan 

      3 years ago from New Delhi, India

      Very informative hub and quite well researched too!

      Safety and security are very important these days, at personal level, community level and national level and International level for obvious reasons. Such was not the case, some two, three decades earlier. But now we have become used to it.

      Interesting and informative hub, voted up and thanks for sharing!

    • Buildreps profile imageAUTHOR

      Buildreps 

      3 years ago from Europe

      Thanks, Bill. These changes slip step by step into society. Homeland Security will surely influence the rights of some citizens in a negative way.

    • billybuc profile image

      Bill Holland 

      3 years ago from Olympia, WA

      Always a fascinating read. I would say your warnings are well-founded. We have Homeland Security here, a nice little organization started after 9/11 which is meant to provide security for us all....but some of us fear that our rights as citizens are in danger of being eliminated in the name of security.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)