NYPD Routinely Tracked Citizen’s Cellphones Without Warrants Since 2008

TN Note: There is no justification for anyone using Stingray technology to secretly track a citizen’s cell phone, except that a search warrant is in hand. However, all other citizens in close proximity are also caught in the dragnet, making it a privacy advocate’s nightmare. Technocrats see no problem in skirting the law when it suits their purposes. 

New York City police have tracked citizens’ cellphones over 1,000 times since 2008 without using warrants, according to public records obtained by the New York Civil Liberties Union.

The organization announced on Thursday that the NYPD has typically used “stingrays” after obtaining lower-level court orders, but not warrants, before using the devices. The department also does not have a policy guiding how police can use the controversial devices. This is the first time that the scope of stingray use by the nation’s largest police agency has been confirmed.

The devices, generically known as stingrays, work by mimicking cell towers and tracking a cellphone’s location at a specific time. Law enforcement agencies can use the technology to track people’s movements through their cellphone use. Stingrays can also detect the phone numbers that a person has been communicating with, according to the NYCLU. The devices allow law enforcement to bypass cellphone carriers, who have provided information to police in the past, and can track data about bystanders in close proximity to the intended target.

Read full story here…




U.S. Director Of National Intelligence: We Might Use Smart Home Devices To Spy On You

TN Note: Americans need to see the web of surveillance being spun all around them. “Smart Home” devices that exist in major appliances, thermostats, LED light bulbs and security cameras are all targets for spying. Smart Grid provides WiFi-enabled connectivity to every smart appliance within your home. Every WiFi router and cable modem is also a gateway into private areas.

Note that the Director of National Intelligence is head of all 16 intelligence agencies in the U.S., including the NSA. The position was created by President George W. Bush in 2005, and the first appointee to fill the position was Trilateral Commission member John Negroponte. Negroponte architected and re-organized the intelligence community to provide future monitoring for the coming Technocracy.

If you want evidence that US intelligence agencies aren’t losing surveillance abilities because of the rising use of encryption by tech companies, look no further than the testimony on Tuesday by the director of national intelligence, James Clapper.

As the Guardian reported, Clapper made clear that the internet of things – the many devices like thermostats, cameras and other appliances that are increasingly connected to the internet – are providing ample opportunity for intelligence agencies to spy on targets, and possibly the masses. And it’s a danger that many consumers who buy these products may be wholly unaware of.

“In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper told a Senate panel as part of his annual “assessment of threats” against the US.

Clapper is actually saying something very similar to a major study done at Harvard’s Berkman Center released last week. It concluded that the FBI’s recent claim that they are “going dark” – losing the ability to spy on suspects because of encryption – is largely overblown, mainly because federal agencies have so many more avenues for spying. This echoes comments by many surveillance experts, who have made clear that, rather than “going dark”, we are actually in the “golden age of surveillance”.

Privacy advocates have known about the potential for government to exploit the internet of things for years. Law enforcement agencies have taken notice too, increasingly serving court orders on companies for data they keep that citizens might not even know they are transmitting. Police have already been askingGoogle-owned company Dropcam for footage from cameras inside people’s homes meant to keep an eye on their kids. Fitbit data has already been used in court against defendants multiple times.

Read full story here…




Private Company Tracked Iowa Caucusgoers’ Cellphones In Real Time To Analyze Voting

TN Note: Dstillery is the company behind this, and it was their first foray into political analysis. Their website boasts, “Be First in Connecting With Always-On Customers.” The technology is reminiscent of the Jade Helm military exercise in summer 2015 where geo-spatial intelligence was used to model communities via artificial intelligence software. After you are matched with your cell phone, all other data about you is searched out and fed to the AI program: social media, purchases, Internet browsing history, location tracking – all in real-time. Geo-spatial monitoring has led one top expert to conclude that it is comparable to digital slavery. Technocracy heaven has arrived.  

Who needs exit polls when you can track caucusgoers’ phones?

That’s what one company did. Dstillery, which has been called “Picasso in the dark art of digital advertising,” turned its intelligence-collection capabilities to the Iowa caucuses last week.

The company used location data to identify more than 16,000 devices at caucus locations across the state.

“We can take a population in a discrete location — in this case a polling, a caucus site — and sample that population and go and then look at characteristics of that population that no one’s been able to discern before, because we have this incredibly rich behavioral view of American consumers based on all the digital behaviors we observe,” Dstillery CEO Tom Phillips said in an interview.

The results are interesting, if scientifically inexact. The company could not tell how individual caucusgoers came down by candidate but could determine, in counties decisively won by certain candidates, the dominant online behaviors of attendees:

  • Caucusgoers who were expecting a child or had a young baby tended to be Republican, and they showed up in greater numbers where Florida Sen. Marco Rubio was victorious.
  • Other family behaviors – those associated with both working and stay-at-home parents, buyers of kids’ clothing and back-to-school supplies – were high at caucus sites that went to Texas Sen. Ted Cruz. On the Democratic side, they were split between Hillary Clinton and Sen. Bernie Sanders.
  • Caucusgoers in counties won decisively by Donald Trump tended to have stronger household interests – grillers, do-it-yourselfers, lawn and garden and hardware. He didn’t do well with business leaders — those whose online behavior indicates they are business owners or executives. More of those folks showed up where Rubio support was decisive.
  • Sports fans (NCAA, NFL, NBA, NHL, baseball and fantasy leagues) showed up in greater numbers at caucuses won by Rubio and Sanders. NASCAR fans, however, correlated with Trump and Clinton support.
  • Techies – information-technology decision-makers and technology buyers – correlated with Rubio and Sanders support.

In a harbinger of more (slightly spooky) technologies that could be ahead for political campaigning — if they aren’t already in use — Dstillery also cross-referenced which devices had been used on university campuses during the previous two weeks to determine how many caucusgoers were students — roughly 5.4%, according to the analysis. And those voters showed up in greater numbers where Sanders and Rubio scored decisive wins.

Read full story here…




Cockroach Robots: Scientists Discover New Mobility Techniques

TN Note: They will smell, see, touch, sample, run like blazes and they will create intelligent networks so they can “swarm” in unison. Don’t bother with bug spray. The purported use of robot cockroaches is for search and rescue in disaster areas, but in the hands of master surveillance organizations, it will be the go-to bug. In the hands of crooks, it will be the perfect reconnaissance tool.

After running roaches through tunnels that were only as high as two pennies stacked flat, researchers at UC Berkeley have designed a cockroach robot that’s able to squeeze through tiny spaces at blazing speeds.

Such a roach bot, described in the Proceedings of the National Academy of Sciences, might eventually be deployed as search-and-rescue robobugs in rubble-strewn disaster zones and may cause scientists and engineers to redefine their ideas about the kinds of animals that can inspire “soft robotics.”

Study co-author Robert Full, a UC Berkeley biomechanist, has long explored how animals move – he’s analyzed how geckos stick to walls and built other roach-inspired running robots. But he soon became intrigued by the insects’ ability to wriggle their way into nooks and crannies – even though they technically have a hard, exoskeleton-clad body.

“Animals with exoskeletons like cockroaches can go everywhere, and infest any space, so we wondered, well, how did they do that?” Full said. “So we constructed a series of tight crevices to see what they could do.”

The researchers took American cockroaches (Periplaneta americana) – “the one you think you don’t have in your house, but you do,” Full said – and had them run through a tunnel 12 millimeters high. Then they reduced the tunnel height, down to 9 millimeters, and then 6 millimeters, and then to a tight 4 millimeters – less than a third of their standing body height. Until the last, tightest tunnel, the cockroach basically maintained its high speed, running with its legs spread out out as its body became increasingly smooshed.

“They run really fast even though they’re compressed in half, their legs completely splayed out to their side,” Full said. “They could still run at 20 body lengths per second, 60 centimeters a second — which if you scale it up is 70 miles an hour for a human.”

Read full story here…




How Facebook, Google And Other Internet Titans Are Profiling You And Profiting From It

TN Note: Technocracy lives and breathes data, all of which is necessary for monitoring the social machine. The Technocrat magazine stated in 1938, “Technocracy is the science of social engineering, the scientific operation of the entire social mechanism to produce and distribute goods and services to the entire population… “, and this is exactly what is happening today.

Facebook, Google, and the other Internet titans have ever more sophisticated and intrusive methods of mining your data, and that’s just the tip of the iceberg.

The success of the consumer Internet can be attributed to a simple grand bargain. We’ve been encouraged to search the web, share our lives with friends, and take advantage of all sorts of other free services. In exchange, the Internet titans that provide these services, as well as hundreds of other lesser-known firms, have meticulously tracked our every move in order to bombard us with targeted advertising. Now, this grand bargain is being tested by new attitudes and technologies.

Consumers who were not long ago blithely dismissive of privacy issues are increasingly feeling that they’ve lost control over their personal information. Meanwhile, Internet companies, adtech firms, and data brokers continue to roll out new technologies to build ever more granular profiles of hundreds of millions, if not billions, of consumers. And with next generation of artificial intelligence poised to exploit our data in ways we can’t even imagine, the simple terms of the old agreement seem woefully inadequate.

In the early days of the Internet, we were led to believe that all this data would deliver us to a state of information nirvana. We were going to get new tools and better communications, access to all the information we could possibly need, and ads we actually wanted to receive. Who could possibly argue with that?

For a while, the predictions seemed to be coming true. But then privacy goalposts were (repeatedly) moved, companies were caught (accidentally) snooping on us, and hackers showed us just how easy it is to steal our personal information. Advertisers weren’t thrilled either, particularly when we adopted mobile phones and tablets. That’s because the cookies that track us on our computers don’t work very well on mobile devices. And with our online activity split among our various devices, each of us suddenly appeared to be two or three different people.

This wasn’t a bad thing for consumers, because mobile phones emit data that enable companies to learn new things about us, such as where we go, who we meet, places we shop, and other habits that help them recognize and then predict our long-term patterns.

But now, new cross-device technologies are enabling the advertising industry to combine all our information streams into a single comprehensive profile by linking each of us to our desktop, mobile phone, and iPad. Throw in wearable devices like a Fitbit, connected TVs, and the Internet of Things, and the concept of cross-device tracking expands to potentially include anything that gives off a signal.
The ad industry is drooling over this technology because it can follow and target us as we move through our daily routines, whether we are searching on our desktop, surfing on our iPad, or out on the town with our phone in hand.

There are two methods to track people across devices. The more precise technique is deterministic tracking, which links devices to a single user when that person logs into the same site from a desktop computer, phone, and tablet. This is the approach used by Internet giants like Facebook, Twitter, Google, and Apple, all of which have enormous user bases that log into their mobile and desktop properties.
A quick glance at Facebook’s data privacy policy shows it records just about everything we do, including the content we provide, who we communicate with, what we look at on its pages, as well as information about us that our friends provide. Facebook saves payment information, details about the devices we use, location info, and connection details. The social network also knows when we visit third-party sites that use its services (such as the Like button, Facebook Log In, or the company’s measurement and advertising services). It also collects information about us from its partners.

Most of the tech giants have similar policies and they all emphasize that they do not share personally identifiable information with third parties. Facebook, for example, uses our data to deliver ads within its walled garden but says it does not let outsiders export our information. Google says it only shares aggregated sets of anonymized data.

Read the full story…




Homeland Security Seeks State-Of-The-Art Automated Social Media Analytics Software

TN Note: DHS can draw on intelligence information from any other agency, but feels that it needs yet more advanced software tools to analyze social media in order to find evil-doers. The RFI gives lip-service to “protect the privacy, civil rights and civil liberties of individuals involved in open source and social media communications” but the intent to spy on all Americans is clear. Data collection and monitoring is the heartbeat of Technocracy, because one of the first rules of engineering states that you cannot control what you cannot monitor.

The Department of Homeland Security wants businesses to present their cutting-edge social media analytics services next month — especially technology that could enhance criminal investigations, traveler screenings and situational awareness.

In a new request for information, DHS said it is looking for open source analytics tools that can make internal operations more efficient and reduce costs through “advanced analytic automation,” across the department, all while using “privacy, civil rights and civil liberties-protecting analytic methods.”

Respondents have until Feb. 9 to submit descriptions of their analytics capabilities, including geospatial processing, foreign and spoken language processing, and keyword, image and video analysis, among other elements.

DHS plans to ask 30 “exemplars of social media analytics capabilities in the market place” to present technology that could help analysts find patterns “in the context of homeland security investigative, screening and/or homeland security mission related situation awareness missions.”

Those groups will be asked to present on Feb. 26, the RFI said.

The solicitation also asked respondents to describe the way they “protect the privacy, civil rights and civil liberties of individuals involved in open source and social media communications,” including factors such as data removal methods, “role based access to information, user audit, system logging, policy enforcing mechanisms, encryption, etc.”

The announcement comes weeks after federal social media screening policies came under fire, especially in light of the San Bernardino shootings, when it was widely reported that one of the shooters had posted public pro-ISIS messages on Facebook. (Federal Bureau of Investigation director James Comey subsequently said those were private, direct communications.)

DHS policies in particular were criticized last month when Congress blasted the department for not examining immigrants’ social media accounts closely and routinely when granting visas, The Hill reported.

Read the full story here…




NSA Harvesting Millions Of Faces From Internet Images

TN Note: The NSA has been slapped every which way by Congress to quit indiscriminate spy operations on Americans, but technocrats as they are, they ignore Congress and continue on their mission. Remember that the NSA is fully controlled (e.g., both funding and operations) by the Director of National Intelligence, who is currently James R. Clapper. Since George W. Bush established the agency in 2005 and handed all of the nation’s intelligence agencies over to it, two DNIs have been members of the Trilateral Commission: John Negroponte (3/2005-2/2007) and Adm. Dennis C. Blair (1/2009-5/2010). One can safely conclude that the entire intelligence community, including the NSA, is acting on behalf of those attempting to implement Technocracy in our nation.

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

“It’s not just the traditional communications we’re after: It’s taking a full-arsenal approach that digitally exploits the clues a target leaves behind in their regular activities on the net to compile biographic and biometric information” that can help “implement precision targeting,” noted a 2010 document.

One N.S.A. PowerPoint presentation from 2011, for example, displays several photographs of an unidentified man — sometimes bearded, other times clean-shaven — in different settings, along with more than two dozen data points about him. These include whether he was on the Transportation Security Administration no-fly list, his passport and visa status, known associates or suspected terrorist ties, and comments made about him by informants to American intelligence agencies.

It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Given the N.S.A.’s foreign intelligence mission, much of the imagery would involve people overseas whose data was scooped up through cable taps, Internet hubs and satellite transmissions.

Because the agency considers images a form of communications content, the N.S.A. would be required to get court approval for imagery of Americans collected through its surveillance programs, just as it must to read their emails or eavesdrop on their phone conversations, according to an N.S.A. spokeswoman. Cross-border communications in which an American might be emailing or texting an image to someone targeted by the agency overseas could be excepted.

Read full story here…




Obama Proposes $3.9 Billion Initiative To Put Driverless Cars On American Roads

President Obama intends to set in motion a ten-year, $3.9 billion plan to put driverless cars on the highways of America.

Although the plan will likely require congressional approval, it is unlikely that there will be much resistance to it because it offers Pollyanna-ish goals of reducing road deaths and travel delays. Of course, it will start a windfall for auto companies who will be obliged to replace virtually every car currently on U.S. roads.

The Administration will also provide the testing facilities to bring various auto makers together to flesh out technology that allows “connected vehicles” to talk to one another as they roll down the road, ostensibly to avoid crashing into each other.

U.S. Transportation Secretary Anthony Foxx said last week, “Automated vehicles open up opportunities for saving time, saving lives and saving fuel… we are bullish on automated vehicles.” There is no evidence that the “we” he speaks of actually includes any actual American drivers or car owners.

Who is driving this boondoggle? Look no further than Google (via their super-corporation, Alphabet) and Tesla Motors. Both are already heavily invested in driverless technology and both have buckets of money to spend lobbying the government for wheelbarrows of more money. Of course, it helps to open doors when the Chairman of Google, Eric Schmidt, is also a member of the elitist Trilateral Commission.

One of the main drivers for Google is perfecting the “connected automobile”. Every car will be equipped with an always-on wifi technology that will allow occupants to stay on their laptops, tablets and smart phones while the car’s AI program sails them down the road to their destination.  The connected auto is also a major step in fleshing out the ubiquitous Internet of Things where devices are interconnected with each other for real-time interaction.

Imagine zooming down the road with your iPhone in your hand and a message pops up that a friend just passed you going in the other direction. Siri announces,

“John, it’s lunch time and your favorite restaurant is only 2 miles away from your current location and you just passed your friend Mary in the other direction. Would you like to send a lunch invitation to her? If she accepts, I can make the reservation and re-route both of you to meet at the restaurant in about 4 minutes.”

Pretty cool, huh? Well, here is a darker scenario: A warrant for your arrest was issued earlier in the morning for failing to pay a parking ticket on time. The electronic notice was spread automatically to your microcosm of the Internet of Things, which includes your car. Again, Siri speaks,

“John, your car has just received notice that a warrant for your arrest was issued this morning because you failed to pay that parking ticket you got last month in Fresno and the deadline for payment was last Thursday. There is a highway patrolman 3.5 miles ahead who has already issued an instruction to pull your car over in order to resolve the issue with you.”

The fact is, you will be tracked and recorded everywhere you go. Nothing will be private and everything you do (or try to do) will be micro-managed and controlled.

Welcome to the Technocracy, which was defined as early as 1938 as “the science of social engineering, the scientific operation of the entire social mechanism to produce and distribute goods and services to the entire population.” Perfect efficiency, controlled by science, technology and droves of unaccountable technocrats who believe they know better how to structure your life than you do.

They will protect you, they say. Make life easier for you, they say. All you have to do is quit whining and submit to the “system.” You can’t beat the system, they say. Resistance is futile.

In short, technocrats are creating the future they want. But is it the future you want?

Just in the last 7 years since Obama has been President, technocrats have dipped into the public purse to fund major initiatives like the solar and wind technology (a huge bust) and Smart Grid. Those billions were not requested by citizens because there was virtually zero public demand for smart meters or solar panels and wind turbines.

Likewise, Obama’s current $3.9 billion for driverless cars is not driven by any meaningful consumer demand, but only by unelected and unaccountable technocrats. It’s time to say, “No more!”




Smart Meters Can Be Used To Spy On Your Home And Your Data Sold Anywhere

TN Note: Smart meters are NOT about making life more convenient for you. They are a key component of implementing Technocracy and every shred of data that can be harvested from your home is fair game for anyone with connections and money to buy it. Indeed, they will “balance the load” but they never told you that they would balance it on your back, not theirs.

Families who have digital smart energy meters installed in their homes could find the devices are being used to spy on their habits, campaigners have warned.

A Mail investigation has discovered how marketing firms are targeting data collected by smart meters, which reveal how customers use their gas and electricity, and hoping to turn the information they provide in to a steady stream of cash.

Experts say the devices might be used to provide companies with clues to information about customers’ lives which can be used for profit.

Privacy campaigners fear that in the most extreme cases sensitive data could be sold onto healthcare companies which could try and sell specially targeted goods and services to these customers.

Firms must ask customers’ permission before examining in depth data or selling it on to third parties.

But experts fear that many customers who sign up for a smart meter may not be aware of how their data will be used.

A spokesman for privacy campaign group Big Brother Watch said: ‘A smart meter will monitor your homes energy consumption, creating a honeypot of data which energy insurance and marking companies will inevitably be hungry for.

‘These companies will be monitoring our every move whilst in the home.

‘Energy is an essential which we all use, exploiting that data for alternative purposes such as marketing, advertising is a concern and should be flagged in clear language to anyone thinking about installing a smart meter in their home.’

Under Government plans, 50 million homes will be fitted with a smart meter by 2020 in a £11bn drive. Currently around 5,000 properties a day are being fitted with one.

The gadgets allow customers to see on a screen how much exactly their energy costs as they use it.

Information is fed directly to energy companies removing the need for meter readings or estimated bills.

Energy firms benefit too, because they can easily see when demand for gas and electricity is at its highest and jack up energy prices accordingly.

Alternatively, they can lower costs when demand is low.

Although energy firms will have to foot the bill for providing the devices, they are not allowed to directly charge customers for installing smart meters.

But they are expected to claw back these costs in other ways.

xperts say firms are eying up the steady stream of data that the devices provide about customers’ lifestyles as a way of making a profit.

Personal data has been dubbed the ‘new oil’ by marketing firms, who say that the clues it provides about our lifestyles and spending habits.

Companies can use this information to reap huge profits by selling the data on or hitting customers with targeted deals.

Gas and electricity firms will be able to use smart meters to collect information about how customers use energy as frequently as every half hour.

This could reveal details such as which rooms and gadgets clients use most regularly, as well as when homeowners are in or out and even what time they are going to bed or how many cups of tea we make.

A family whose meter showed their home is losing a lot of heat compared to other neighbouring homes, might be a ripe target for insulation or a new boiler.

By contrast someone who uses a lot of energy at peak prices could be identified as a profitable customer and offered extra perks to keep them on the company’s books.

A document by data firm Pitney Bowes describes smart meters as a ‘once in a generation business opportunity for energy providers’.

It says its software will allow energy firms to use smart meters to ‘clearly identify the most profitable customers’ and ‘optimise customer contact by using smart meter data to get relevant offers to the right customers at the right time through their preferred channel’.

It will also help firms to ‘cross-sell, up-sell and retain customers’.

Read full story here…




Internet of Things Will Actually Start Connecting With Next Generation WI-FI

TN Note: Implementing the Internet of Things (IOT) has suffered because Wi-Fi technology has lagged behind. Almost everyone with a Wi-Fi router in their home knows that there are plenty of “dead” spots in the house. The new Wi-Fi standard will completely erase those inconveniences while making a strong signal possible to all corners of your property. Plus, city-wide Wi-Fi will allow things to be connected the the larger Internet grid. This technology is essential to the implementation of Technocracy. 

There are plenty of blockades between now and the connected-device future that’s been so long on the horizon. One of these is Wi-Fi, which has limitations that keep connected devices from connecting quite as efficiently as they could. Now, there’s a plan in place to fix it.

The Wi-Fi Alliance, the organization that dictates and advances Wi-Fi standards, has announced the latest iteration of its increasingly indispensable technology. Called HaLow, it promises to double the range of standard 2.4GHz Wi-Fi connections, while also doing a better job of penetrating walls, floors, and other obstacles that can make your Wi-Fi sputter and skulk.

It manages this deftness and range by operating on the 900MHz band, a chunk of spectrum that’s better suited for small data payloads and low-power devices than the relatively intensive, battery-straining 2.4GHz and 5GHz bands on which most current Wi-Fi routers operate. To cut through the numbers and specs and standards for a moment: It’s Wi-Fi for smartwatches and Internet-enabled coffee makers and whatever other connected appliance might suit your deranged fancy.

“For a consumer, you might imagine someone who wants to deploy a water sensor in their basement to detect flooding or a motion sensor at the end of their driveway to warn them of someone arriving late at night,” says Kevin Robinson, Wi-Fi Alliance vice-president of marketing. “In both of these cases, Wi-Fi HaLow will deliver power-efficient connectivity to the home access point (and the Internet) despite the challenging environment caused by obstructions in the device’s path or ranges involved.”

At this point you might be wondering why we’d need such a thing, when so much of what we’ve just described is already capably handled by Bluetooth, the connectivity tech of choice for most low-powered, online devices. You’re right to wonder! There are a few potential answers, the most important of which being that Wi-Fi connects devices directly to the Internet, not just to another device. That may not seem so important now, but it will be critical as wearables, in particular, strive to become truly untethered. Eventually, connected devices need to transition from Pinocchio to real boy. HaLow should help that process.

Also, unlike Bluetooth, Wi-Fi Halow’s ambitions extend quite a bit further than than your living room.

“Wi-Fi HaLow is well suited to meet the unique needs of the Smart Home, Smart City, and industrial markets,” says Edgar Figueroa, Wi-Fi Alliance President and CEO. “[It] expands the unmatched versatility of Wi-Fi to enable applications from small, battery-operated wearable devices to large-scale industrial facility deployments.”

That’s partly because, Robinson pointed out, in addition to the various security and interoperability features found in the Wi-Fi you know, HaLow will also share its ability to “support thousands of devices per access point.” That means a business that requires huge numbers of environmental monitoring stations across multiple facilities would have a simple, integrated way to keep track of them.

Read full story here…