|
Tom woke up on Saturday morning, rolling out of bed quietly so as not to wake his wife. Once downstairs he found that they were out of Coffee. Groggy, he pulled on some sweat pants and grabbed his keys. While driving to the corner store, the specially encoded key registered with the car's computer and uplinked to a orbiting GPS satellite. It was recorded that Tom was driving the car, via passive fingerprint identification from the steering wheel. Once Tom reached the corner store, and got out of the car, the trip was recorded and uploaded into the national travel database where it would be compared with other trips to look for suspicious patterns or any common locations with terrorists. Inside he purchased a can of ground coffee, and while there picked up a stick of gum and the morning paper. His purchases were logged by the store, and then uploaded to a national purchases database where they were compared with known purchasing patterns of terrorists, and also to look for possible money laundering activities which might support terrorist organizations. Tom headed back home, his trip once again being logged by the national security in travel database.
Later that day Tom called his friend Bill to see if he'd be up for a casual game of Tennis. The phone call was recorded by the national database, and compared to other phone records, and to see if the call was suspicious, or linked with terrorism. Bill was game, so Tom gathered up his gear and headed to the tennis court. Once again the trip was recorded by the N.S.I.T. database. Seeing Bill already on the courts when he pulled up, Tom grabbed his gear and jogged over to give Bill a handshake. The handshake was recorded by local area automatic security cameras. Noticing two people in close proximity, and even touching, the camera, making face identifications through an automatic system. Bill and Tom had their activities cross scanned with the database to see if their meetings had any connections with terrrorists. After a good game, where Bill won by dominating the first set and squeeking out a victory in the second, Tom shook Bill's hand in congratulations. They once again were scanned by the camera and cross checked in the database. Tom headed home for a shower, his journey again logged.
The hot shower felt good. Tom wasn't 20 years old anymore. A passing drone aircraft recorded the heat bloom from the shower with an infrared scan and logged it into the database with the corresponding address with it's average temperature and length to be compared with possible heat blooms generated by illicit weapons manufacture by terrorists. After the shower, and feeling relaxed, Tom headed downstairs and flipped on the television to relax for a bit. The local baseball team was playing their bitter rivals. Tom turned up the volume, and grabbing the paper, sat down onto the couch. The television reciever notified the national database that Tom, via fingerprint identification on the remote, had turned on the game, to look for suspicious usage such as a prediliciton with shows about bombmaking. Tom nodded off to nap.
---
The government knows that morning that Tom drove to the store, where he purchased coffee gum and the paper and drove home. After which the government knows he called Bill, met bill in public, then drove back home. They know that he created a heat bloom in his house, most likely from a shower, and aftewards watched the game. How long till this is in place nationwide?
|