The Eyez project is developing a pair of stylish specs with a hidden 720p video camera, mic and 8GB of memory. But wait, that’s not all! These badboys are also Bluetooth-enabled so, when coupled with a mobile phone, can stream live video out to the web. Take that dirty cops!
Our engineering team at ZionEyez is currently developing Eyez, the latest innovation in personal video recording technology. Eyez embeds a 720p HD video camera within a pair of eyeglasses designed to record live video data. The recorded data can be stored on the 8GB of flash memory within the Eyez glasses, transferred via Bluetooth or Micro USB to a computer, or wirelessly transferred to most iPhone or Android devices. After a one-time download of the "Eyez" smartphone and tablet app, users can wirelessly broadcast the video in real time to their preferred social networking website.
This incredible short film by Peruvian filmmaker Montreuil is 6 minutes of pure, pharmaceutical-grade awesomeness. Set in a dystopic Los Angeles, the film follows Chris Black (Victor Lopez), a man who “possesses a power that could lead to the destruction of the current regime” and his desperate race for survival. Produced on a budget of $5,000 – roughly the amount that Hollywood films spend on 1 page of a script – it pound-for-pound equals or betters your average blockbuster.
You can watch the embed here, but if your broadband can handle it, I highly recommend heading over to Vimeo for the Hi-Def version!
Festering underneath all of this is the industries’ dirty little secret – that for all reforms elsewhere in law enforcement and intelligence, airport security is running the exact same playbook that failed so miserably to prevent 9/11. You can put as many badges and blue uniforms you want on them, but the TSA are nothing more than the same old cast of players, spasmodically trying to dazzle us with their shiny new (yet demonstrably ineffective) props while phoning-in dialogue from the same, tired script. This kind of expensive theater may have been appropriate in the weeks and months following 9/11, but it’s time we grow up. The bottom-line is that none of this Madison-Avenue bravado is helping to capture actual terrorists - nay, of the 29,000 or so arrests from the DHS, nearly all were for unrelated charges such as counterfeiting, narcotics, and child pornography. Of the average 50 or so of those arrested annually on “terrorist-related” activities (based on incredibly broad metrics) culminating in convictions, nearly all have resulted from investigations operating well outside airport jurisdictions.
Considering that 9/11 was an aircraft-centric attack (and planes always make attractive targets), our disproportional obsession with airport security (at the expense of more potentially catastrophic targets such as shipping ports, network infrastructures, etc.) had a certain short-term logic. Yet as seductive as this may have been, the time has come to recognize that in the near decade since 9/11, not a single one of these airport security programs has withstood an independent investigation of its efficacy. Rather, on the occasion that an actual terrorist – say, the shoe or underwear bomber – managed to pull off an attempt, what prevented casualties was not the billions we spend in anticipating absurdly-specific attack scenarios, it was not the endless hours of theater spent removing shoes, and it certainly was not the confiscation of a four-year olds play-do or the destruction of an old man’s rectal seton. No, in each case it was not the TSA but us - fellow passengers who understand that sometimes our safety is in our own hands.
In the ad-hoc sense, this is the perfect example of civilian-based defense (open-source security in the modern vernacular) and I would not be the first to point out that this is generally a good thing. After all, surrendering your security to a third party not only breeds complacency but dismantles our most effective means of front-line defense. I believe moreover that this kind of self-determination fosters a more committed civic engagement while providing substantial returns on effectiveness. Yet I would level the same criticism at civilian-based defense that I would at our “professional” systems – namely that security must be carefully balanced with a clear definition of precisely what it is we are securing. If we want to secure the safety of our physical bodies, whatever the costs, then marshal law is probably our best option. If, however, we want to secure our right to life – that is, our right to preserve and freely participate in our socio-cultural system of choice – then we must be certain that our means do not dismantle our ends and become a causal factor in the very problem they purport to address.
Case in point is the FBI’s sudden realization that, thanks to programs like New York City’s ‘See Something, Say Something’ campaign, all terrorists need to do is leave a harmless bag of underwear lying around in order to cause mass panic, disrupt commerce and distract law enforcement. Ordinarily I would file this under the ‘no duh’ folder and move along. But the fact that the chief federal law-enforcement agency of the United States has just figured this out – and that the media outlets find it newsworthy – demonstrates that after nearly ten years, most people still have little to no clue – no clue about who terrorists are, no clue why they hate us, and no clue how to fight back.
Authoritarian conceptions of security diminish our ability to protect ourselves. At their core, ‘See something, Say something’ programs and their ilk are not only the worst possible perversion of civilian-based defense, but as evidenced by the panic they reap, are actually themselves a form of insecurity. Even putting aside the fact that such campaigns have never once (repeat: not once) resulted in a terrorism-related arrest, the entire concept reeks of the same self-aggrandizement inherent to all forms of domestic counter-terrorism since 9/11 – that terrorism is somehow akin to conventional warfare and therefore remains the domain of government. It is a nod to the fact that only an engaged citizenry can defend against a diffuse and nebulous network of attackers yet a simultaneous refusal to cede central authority in the solution. It infantilizes people by providing the illusion of open-source security without any of the concurrent tools and empowerment. Worse, they come with the implicit admonishment that we should all remember our place in this conflict and leave security to the professionals.
Why must it be this way? Perhaps there is some plausibility to the assumption that the government has failed to focus on the only demonstrably effective avenue of security because they simply have no expertise or awareness of civilian-based defense. Suspending our disbelief for the time being, this would indicate such a tremendous oversight that we must seriously question the leadership in the DHS. No, the more logical, albeit tremendously more cynical, explanation is that the continued focus on centralization is tied into the governments twin obsessions over ownership and indispensability.
With regards to the latter, the government is more than aware that it is running out of things to justify its present incarnation. After decades of ceding political authority to international corporations and simultaneously eroding its own regulatory powers, security is virtually all it has left. As we the people have defined the job, this is the state’s primary responsibility – to ask the people for help would be akin to an admission that they are not up to the task. There is no such thing here as ‘change we can believe in’ – as in the final days of the Soviet Union, security-related expenses account for more than half of the national budget. While this fact may be part of a far larger discussion that needs to take place, for the time being the government will continue to claim a monopoly over the means and direction of security.
Of course, the state is likely also aware that this need not be a zero-sum issue. After all, an effective civilian-based defense requires coordination, training, study, planning, instititutionalization – all the things that government is really good at. Yet while centralized bureaucracy may pursue such indispensability, it will find it nearly impossible to maintain ownership. When those who wish us harm are unified only by ideology, security is affirmed only by articulating a counter-ideology; an explicit yet fluid vision of the world we would like to see and a set of principles by which this will be actualized. And therein lies the contradiction of ownership – when real people are asked to provide for their own security, we are going to demand returns – we will not be content to view this as a permanent state of warfare, but rather insist on a proactive and sincere analysis of the underlying causes. And this will seriously undermine the case for the corporatist, neo-liberal planet upon which those who control government now depend.
Local artist Paul Strong, Jr. says he’s holding the demonstration, called the Camerahead Project, to remind people that video surveillance cameras are recording their every move at Cal Anderson Park and three other parks around town. “The project not only raises the questions of who is watching who and who is watching the watchers, but also … why we are being watched at all,” he says. “There is so much going on in the news about wiretapping and data mining, all these little thing that happen locally go right by.”
Without any congressional input, the executive branch has begun structuring a department to conduct domestic surveillance spying. With a moniker that would make Orwell blush, the National Applications Office will have virtually unfettered access to classified intelligence data, including the ability to access inch-level satellite detail to observe the citizens of the United States. Snipped from their own website (emphasis added):
The U.S. Department of Homeland Security's (DHS) National Applications Office (NAO) is the executive agent to facilitate the use of intelligence community technological assets for civil, homeland security and law enforcement purposes within the United States. The office will begin initial operation by fall 2007 and will build on the long-standing work of the Civil Applications Committee, which was created in 1974 to facilitate the use of the capabilities of the intelligence community for civil,non-defense uses in the United States.
Despite opposition from both Democrats and Republicans on the committee that the program violates the Posse Comitatus Act, the Assistant Secretary for Intelligence & Analysis continued to assert that legal and civil rights oversight concerns were misplaced. And rightly so, I mean honestly, who wouldn't trust such a forthright bunch? Are these tactics part of the instruction they get when getting a homeland security degree? Seriously ...
Fallacious yet widespread and documented beliefs courtesy of Wikipedia.
The forbidden fruit mentioned in the Book of Genesis is commonly assumed to be an apple, and is widely depicted as such in Western art, although the Bible does not identify what type of fruit it is. The original Hebrew texts mention only tree and fruit. Early Latin translations use the word mali, which can be taken to mean both "evil" and "apple". German and French artists commonly depict the fruit as an apple from the 12th century onwards, and John Milton's Areopagitica from 1644 explicitly mentions the fruit as an apple. Jewish scholars suggested that the fruit could have been a grape, a fig, wheat, or etrog. Likewise, the Quran speaks only of a forbidden "tree" and does not identify the fruit.
Books by Jay
Conflict and Conciliation: Faith and Politics in an Age of Global Dissonance
Despite the peaceful foundations of global monotheistic religions, the broad diversity of interpretations can lead to a sharp paradox regarding the use of force. Inevitably, we must ask ourselves: How can those who ascribe to peaceful beliefs suspend their own moral foundation to beat the drums of war? ... read more
Hover or click for reviews
A self-indulgent blog for people just like me - PhD, author, photographer, entrepreneur, husband, father, music-lover, and uber-geek. More about Jay