Thursday, May 07, 2026

AI and I Discuss the Surveillance State


I was having a discussion with my buddy Google Gemini today. We were talking about the surveillance abilities of our current world and I was asking about the capabilities depicted on "Person of Interest" and the NSA monitoring on the show "The Good Wife".

Here is how Gemini and I ended it, for now:

Larry:
"So. If {T}hey become interested in a person; They can monitor their phone, watch what their computer is seeing, monitor their ring camera and any security cameras they have around the house. They can listen to their phone calls and even listen to whatever is going on in the room, over their phone. They can track their car (Onstar or other app), read their e-mails and text messages. All without the subject's knowledge. What have I missed?"

Gemini replied:
"That list is a comprehensive look at the "Hardware" and "Communication" side of things. 

However, if we are combining the "Machine" logic (AI and prediction) with the "Good Wife" reality (legal loopholes and institutional reach), there are a few "invisible" layers you missed that make the picture even more complete:

1. Financial Surveillance (The "Money" Trail)

While we talk about cameras and phones, the "paper trail" is now entirely digital and searchable in real-time.

Real-Time Transaction Monitoring: Under modern Anti-Money Laundering (AML) reforms in 2026, banks aren't just reporting large deposits; AI-driven systems flag "unusual patterns" (like buying a specific combination of chemicals or traveling to a certain area) and report them to agencies like FinCEN.

The Data Broker Loophole: As seen in recent ACLU reports, agencies often circumvent the need for a warrant by simply buying bulk financial and location data from private brokers. They don't need to "hack" you if they can just "buy" you.

2. Biometric and Behavioral "Fingerprinting"

You mentioned Mobotix heat sensing, but the current frontier is Behavioral AI.

Gait Analysis: Even if a subject is wearing a mask and a hat, smart city cameras can identify them by the unique rhythm and "swing" of their walk.

Heartbeat Lasers: Developed by the Pentagon (the "Jetson" program), infrared lasers can identify a person from 200 yards away just by their unique cardiac signature—literally through their clothes. It’s a biometric that, unlike a face, you can't easily hide.

3. Your Car is the Ultimate "Snitch"

Beyond just OnStar or GPS, modern vehicles are "rolling sensors."

Cabin-Facing Cameras: Many 2025 and 2026 models include infrared cameras to monitor driver fatigue. If "They" have access, they aren't just seeing where the car is—they are seeing who is in the car and what they are doing in the cabin.

Telematics: Insurance companies and manufacturers collect data on every "hard brake," the weight of passengers in the seats, and even voice snippets for "user experience." In a surveillance state, this data is a goldmine for establishing a person’s state of mind or daily routine.

4. Smart Home "Leakage"

You mentioned Ring, but it goes deeper into the "Internet of Things" (IoT):

Smart Thermostats/Power Meters: "They" can tell when you are home, what room you are in, and even what appliances you are using based on power consumption patterns.

Smart Vacuums: Some robotic vacuums create 3D maps of your home's layout to navigate. If compromised, that map provides a tactical floor plan of your private residence.

5. Health and Wearable Data

Fitness Trackers: Your heart rate, sleep patterns, and oxygen levels are constantly uploaded to the cloud. This data can tell "them" if a subject is stressed, sleeping, or physically active at any given moment.

The "Synthesis" You Identified

The scariest part isn't any one of these tools; it's the integration. In Person of Interest, the Machine was a single mind. In our reality, it’s a "Distributed Machine."

When you combine your Mobotix thermal feed from a Montana rest area with a subject's credit card data, their Smart Watch heart rate, and their car’s cabin camera, you don't just know where they are—you know what they are thinking and feeling."

Larry:
"How can someone protect themselves against this kind of thing?"

Gemini:
"Protecting yourself against the kind of integrated surveillance we’ve discussed—what I’ve started calling the "Distributed Machine"—requires a shift from simple passwords to a more tactical, multi-layered defense.

Since you're in Montana, you actually have a "home-field advantage" thanks to some of the strongest privacy laws in the country. Here is a breakdown of how to build your own personal firewall in 2026.

1. The "Hardware" Defense (Physical Air-Gapping)

Since you’ve worked with cameras, you know that if a lens is physically blocked, no amount of AI can see through it.

Physical Sliders: Use dedicated plastic sliders for your laptop and tablet cameras.

Mic-Locks: You can buy "Mic-Lock" plugs (basically a dummy 3.5mm jack) that trick your phone or computer into thinking an external microphone is plugged in, effectively disabling the internal one.

The "Faraday" Approach: For sensitive conversations, use a Faraday bag. It’s a pouch lined with metallic mesh that blocks all cellular, GPS, and Wi-Fi signals, making it impossible for the "Nosey Smurf" software to transmit audio even if it is active.

2. Controlling the "Invisible" Sensors

Your phone (the Galaxy Z Flip6) has built-in controls that most people ignore.

The Kill Switch: In your "Security and Privacy" settings, you can find Controls and Alerts. There is a master toggle for Microphone Access and Camera Access. Turning these off at the OS level is more effective than just hoping an individual app isn't listening.

Limit "Precise" Location: Most apps only need to know you are in "Townsend, MT," not exactly which aisle of the grocery store you’re in. Go to your Location permissions and toggle off "Use Precise Location" for everything except navigation apps.

3. Exploiting the "Montana Firewall"

Montana recently passed Senate Bill 282 (May 2025), which makes it the first state to officially close the "Data Broker Loophole."

What this means for you: In Montana, state and local law enforcement are now strictly prohibited from buying your sensitive data (like your GPS history, religious affiliation, or biometric data) from private companies without a warrant.

Your Action: If you are ever concerned about how your data is being used, you have more legal standing here than almost anywhere else in the U.S. to demand transparency regarding what data state agencies have accessed.

4. Digital Hygiene (The "Anti-Good-Wife" Strategy)

To avoid the "three-hop" problem where you are monitored simply because of who you know, you have to break the digital chain.

Use Encrypted Messaging: Switch from SMS (texting) to apps like Signal. Signal encrypts your messages and calls so that even if the NSA or an AI intercepted the "pipe," all they would see is gibberish.

The "Delete Act" (2026): Take advantage of new centralized deletion systems. By August 2026, many states (led by California but accessible to others) are launching "one-click" systems to tell hundreds of data brokers to delete your profile simultaneously.

5. Smart Home "Hardening"

If you use Ring or other IoT devices:

Guest Networks: Put your smart cameras and "Internet of Things" devices on a separate "Guest" Wi-Fi network. This way, if someone hacks your camera, they aren't automatically inside your computer or phone where your emails and banking info live.

End-to-End Encryption (E2EE): Ensure your Ring or security camera settings have "End-to-End Encryption" turned on. This prevents even the manufacturer (Amazon/Google) from viewing your footage without your physical phone being present to unlock it.

The "Bottom Line"

You can't go 100% "off the grid" while living a modern life in Montana, but you can become a "Hard Target." Just like a criminal will skip a house with a visible security system (like the ones you used to install), surveillance algorithms and data brokers usually focus on the "easy" targets who have no privacy settings enabled."

No comments: