noworldsystem.com


One Mainframe To Rule Them All

One Mainframe To Rule Them All

http://www.youtube.com/watch?v=XVWNlvI-eB4

http://www.youtube.com/watch?v=Rfv6WJ_h3rM

http://www.youtube.com/watch?v=G5k8R4AgQXU

http://www.youtube.com/watch?v=RjAbzghMioc

Video: RFID microchip propaganda

Google-Earth To Track People In Real-Time

Vehicle Tracking Devices and Road Taxes

 



Google-Earth To Track People In Real-Time

Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather

Cryptogon
September 30, 2009

http://www.youtube.com/watch?v=iGe2DGe_FFQ

The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.

Tice never did tell his story to Congress about this different aspect of the program.

Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.

Synthetic Environments for Analysis and Simulation

Via: Popular Science:

Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.

They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.

They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.

From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.

Up next, they say they want to add weather, birds, and motion in rivers.

 

Ubiquitous Computing: Big Brother’s All-Seeing Eye

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA building search engine for video surveillance footage

 



White House to collect personal info from Twitter, Facebook, Myspace Users

White House to collect personal info from Twitter, Facebook, Myspace Users

http://www.youtube.com/watch?v=ohQFxsPzO4s

Bill would give president emergency control of Internet

White House Calls for Citizens to Inform on Opponents of Obamacare

 



Australia To Enforce Mandatory Internet Censorship

Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter

Paul Joseph Watson
Prison Planet
October 29, 2008

The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.

A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.

The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.

The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.

Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).

Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”

Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.

This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.

Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.

Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.

The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.

If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.

Indeed, Prime Minister Tony Blair called for Internet censorship last year.

In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.

Moves to regulate the web have increased over the last two years.

– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.

– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.

– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”

– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.

– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.

– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.

– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.

– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.

– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.

– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.

– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.

– The EU also proposed legislation that would prevent users from uploading any form of video without a license.

– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”

Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.

 

DARPA building search engine for video surveillance footage

Ars Technica
October 21, 2008

The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.

According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.

The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.

Read Full Article Here

 

EU Set to Move ‘Internet of Things’ Closer to Reality

Daniel Taylor
Old-Thinker News
November 2, 2008

If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.

The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,

“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”

Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.

Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.

The Internet of Things

Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).

According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.

Reporting on the European Union’s pursuit of the IoT, iBLS reports,

“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”

The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.

Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.

South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports

“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’

An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.

A timeline shown in the April 2008 NIC report

The report outlines uses for the technology:

“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.

Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.

Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”

These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html

Security services want personal data from sites like Facebook

http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security

UK.gov says: Regulate the internet

http://www.theregister.co.uk/2008/10/20/government_internet_regulation/

 



’Einstein’ Program: The All-seeing eye of internet activity

’Einstein’ Program: The All-seeing eye of internet activity

Wayne Madsen
Online Journal
September 19, 2008

WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion dollar project called the “Einstein” program.

Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.

In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government’s computer and network security.

Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data.

In fact, WMR has learned that most of the classified technology being used for Einstein was developed for the NSA in conducting signals intelligence (SIGINT) operations on email networks in Russia. Code-named PINWHEEL, the NSA email surveillance system targets Russian government, military, diplomatic, and commercial email traffic and burrows into the text portions of the email to search for particular words and phrases of interest to NSA eavesdroppers. According to NSA documents obtained by WMR, there is an NSA system code-named ”PINWALE.”

The DNI and NSA also plan to move Einstein into the private sector by claiming the nation’s critical infrastructure, by nature, overlaps into the commercial sector. There are classified plans, already budgeted in so-called “black” projects, to extend Einstein surveillance into the dot (.) com, dot (.) edu, dot (.) int, and dot (.) org, as well as other Internet domains. Homeland Security Secretary Michael Chertoff has budgeted $5.4 billion for Einstein in his department’s FY2009 information technology budget. However, this amount does not take into account the “black” budgets for Einstein proliferation throughout the U.S. telecommunications network contained in the budgets for NSA and DNI.

In anticipation of the regulatory problems inherent in domestic email surveillance by the NSA, the Bush administration has ensured that the Federal Communications Commission (FCC) and industry associations have been stacked with pro-surveillance loyalists to ensure that Einstein is widely accepted and implemented.

 



Government to Share Info on Americans With Police

Government to Share Info on Americans With Police

Washington Post
August 16, 2008

The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years.

The proposed changes would revise the federal government’s rules for police intelligence-gathering for the first time since 1993 and would apply to any of the nation’s 18,000 state and local police agencies that receive roughly $1.6 billion each year in federal grants.

Quietly unveiled late last month, the proposal is part of a flurry of domestic intelligence changes issued and planned by the Bush administration in its waning months. They include a recent executive order that guides the reorganization of federal spy agencies and a pending Justice Department overhaul of FBI procedures for gathering intelligence and investigating terrorism cases within U.S. borders.

Read Full Article Here

 



Telecom & Internet Companies to Check Texts and E-mails

UK Telecom & Internet Companies to Check Texts and E-mails

Alan Travis
London Guardian
August 13, 2008

Local councils, health authorities and hundreds of other public bodies are to be given the power to access details of everyone’s personal text, emails and internet use under Home Office proposals published yesterday.

Ministers want to make it mandatory for telephone and internet companies to keep details of all personal internet traffic for at least 12 months so it can be accessed for investigations into crime or other threats to public safety.

The Home Office last night admitted that the measure will mean companies have to store “a billion incidents of data exchange a day”. As the measure is the result of an EU directive, the data will be made available to public investigators across Europe.

The consultation paper published yesterday estimates that it will cost the internet industry over £50m to store the mountain of data.

Conservatives and Liberal Democrats last night branded the measure a “snooper’s charter”.

When the measure was floated after the London bombings in 2005 by the then home secretary, Charles Clarke, it was justified on the grounds that it was needed to investigate terrorist plots and organised crime. But the Home Office document makes clear that the personal data will now be available for all sorts of crime and public order investigations and may even be used to prevent people self-harming.

Read Full Article Here

UN Report Blasts UK On Free Expression
http://www.guardian.co.uk/politics/2008/aug/15/labour.idcards

Zero Privacy In UK
http://www.guardian.co.uk/commentisfree/2008/aug/13/privacy.privacy

Google Ordered To Unmask Mystery Blogger
http://blog.wired.com/business/2008/08/google-ordered.html

Air Force Suspends ‘Cyber Command’ Program
http://www.informationweek.com/news..wArticle.jhtml?articleID=210003721

Blogging Is Not A Crime
http://www.techcrunch.com/20..-a-crime/comment-2439303

 



Military and National Guard to Police DNC

Army Deploys All-In-One Nonlethal Warfare Kit

Wired
August 8, 2008

The U.S. Army is deploying an all-in-one package of nonlethal devices that covers everything from checkpoint control to riot control. “The first of the Brigade Non-Lethal Capability Sets (NLCS) is now fielded to the Army’s 1st Heavy Brigade Combat Team,” reports Defense Daily, an industry newsletter (sorry, subscription only).

The four modules include: the checkpoint module, crowd control and detainee ops module, convoy module, and dismounted module that includes various non-lethal items troops can use during dismounted patrols.

The kits are put into large, weatherproof containers, and include everything from high-intensity lights to loud speakers. The checkpoint tools, for example, includes “equipment to establish and operate hasty and deliberate checkpoints.” That means tire spikes and capture nets.

Other nonlethal sets have been fielded in the past, but the NLCS “includes items not found in the previous sets, such as tasers, Phraselators, Vehicle Lightweight Arresting Devices and Ex-Spray, which allows soldiers to detect explosive residue.”

 

Colorado ’fusion center’ to step up intelligence gathering during DNC

The Colorado Independent
July 30, 2008

Federal and state law enforcement officials will increase intelligence operations during the Democratic National Convention, overseeing an information war room that will be staffed around the clock with analysts who access a dozen databases while receiving reports of “suspicious activity” — activity that some civil libertarians claim could be nothing more than engaging in anti-war protests or photographing federal facilities that could be targeted for terrorist attack.

Central to the efforts is Colorado’s “fusion” center, a place designed to facilitate intelligence sharing among federal, state and military agencies in an effort to prevent terrorism. But civil rights advocates fear that the Colorado Information Analysis Center, (CIAC) now housed in an inconspicuous office building in Centennial, a southern suburb of Denver, could enable unwarranted spying on Americans exercising their First Amendment rights at the convention.

Inside the building, intelligence analysts with the Colorado State Patrol, Colorado National Guard and Federal Bureau of Investigation take local reports of suspicious criminal activity and determine what merits further investigation.

“It’s a filtration point for information,” says Lance Clem, a representative for the Colorado Department of Public Safety, which directs the state troopers who work at CIAC. “We take information from the international and national level and decide what needs to be pushed out to local law enforcement agencies.”

CIAC personnel also take reports of suspicious activities from citizens and other police departments. If a report is deemed by analysts to require additional investigation, it is shared with the appropriate law enforcement officials, but if a report is not determined to merit further inspection, CIAC workers make a log of the event, according to Clem, essentially creating a massive collection of data, some of it reliable and some of it not.

When the Democratic National Convention is held in August, CIAC will be operating 24 hours a day and be fully staffed with up to eight intelligence analysts at any given time.

“CIAC is going to be expanding hours for physical presence in the office,” Clem says about the convention. “Any known threats specifically related to the convention are going to go right to the United States Secret Service and FBI, but CIAC is going to be there to take any reports that citizens have.”

Malcolm Wiley, a spokesman for the Secret Service, says he can’t confirm if members of his agency will be physically present at CIAC while the convention takes place, but he does acknowledge the center’s part in analyzing intelligence data during the event.

“They’ll be sharing information with other intelligence gatherers,” including the Secret Service and FBI, Wiley says.

The military will also be sharing intelligence information and providing support through U.S. Northern Command, (NORTHCOM) a unit stationed at Peterson Air Force Base in Colorado Springs that was created in 2002 for homeland defense missions.

While NORTHCOM personnel will not be working at CIAC during the convention, the unit will share information that is relevant to the center,as it has done occasionally in the past, according to Master Sgt. Anthony Hill, a NORTHCOM spokesman.

Federal and state law enforcement officials will increase intelligence operations during the Democratic National Convention, overseeing an information war room that will be staffed around the clock with analysts who access a dozen databases while receiving reports of “suspicious activity” — activity that some civil libertarians claim could be nothing more than engaging in anti-war protests or photographing federal facilities that could be targeted for terrorist attack.

Central to the efforts is Colorado’s “fusion” center, a place designed to facilitate intelligence sharing among federal, state and military agencies in an effort to prevent terrorism. But civil rights advocates fear that the Colorado Information Analysis Center, (CIAC) now housed in an inconspicuous office building in Centennial, a southern suburb of Denver, could enable unwarranted spying on Americans exercising their First Amendment rights at the convention.

Inside the building, intelligence analysts with the Colorado State Patrol, Colorado National Guard and Federal Bureau of Investigation take local reports of suspicious criminal activity and determine what merits further investigation.

“It’s a filtration point for information,” says Lance Clem, a representative for the Colorado Department of Public Safety, which directs the state troopers who work at CIAC. “We take information from the international and national level and decide what needs to be pushed out to local law enforcement agencies.”

CIAC personnel also take reports of suspicious activities from citizens and other police departments. If a report is deemed by analysts to require additional investigation, it is shared with the appropriate law enforcement officials, but if a report is not determined to merit further inspection, CIAC workers make a log of the event, according to Clem, essentially creating a massive collection of data, some of it reliable and some of it not.

When the Democratic National Convention is held in August, CIAC will be operating 24 hours a day and be fully staffed with up to eight intelligence analysts at any given time.

“CIAC is going to be expanding hours for physical presence in the office,” Clem says about the convention. “Any known threats specifically related to the convention are going to go right to the United States Secret Service and FBI, but CIAC is going to be there to take any reports that citizens have.”

Malcolm Wiley, a spokesman for the Secret Service, says he can’t confirm if members of his agency will be physically present at CIAC while the convention takes place, but he does acknowledge the center’s part in analyzing intelligence data during the event.

“They’ll be sharing information with other intelligence gatherers,” including the Secret Service and FBI, Wiley says.

The military will also be sharing intelligence information and providing support through U.S. Northern Command, (NORTHCOM) a unit stationed at Peterson Air Force Base in Colorado Springs that was created in 2002 for homeland defense missions.

While NORTHCOM personnel will not be working at CIAC during the convention, the unit will share information that is relevant to the center,as it has done occasionally in the past, according to Master Sgt. Anthony Hill, a NORTHCOM spokesman.

Read Full Article Here

 

Military to commandeer campus for DNC operations

The Colorado Independent
July 29, 2008

The Colorado Army National Guard is expected to transform a private Denver university campus into a restricted military lodging area during the Democratic National Convention in August.

More than 400 soldiers could be stationed in official capacity on the campus according to the National Guard, but the Guard is not disclosing what the troops will be doing during the convention.

In mid-July The Colorado Independent reported that the Colorado National Guard was planning to rent more than 500 rooms around the Denver area for business relating specifically to the Democratic National Convention being held Aug 25-38.

At least 400 of those rooms will be used for nine days during Aug. 22-30 at Johnson & Wales University, the old University of Denver law school at 7150 Montview Blvd. in east Denver.

“We only have the Colorado Army National Guard staying with us.” says Lindsay Tracy, a spokeswoman for Johnson & Wales University.

The private university, offering culinary and hospitality programs, will be closed to students during the soldiers’ stay.

“They’re the only ones using the campus. The campus basically will be shut down during that time,” Tracy says. “Only essential staff will be allowed.”

Along with lodging at the school, the National Guard has also ordered more than 30 rooms at an Extended Stay America hotel in an unknown location and more than 70 rooms at the Drury Hotels, also located in east Denver, at 4400 Peoria St.

A Drury Hotels representative declined to comment, citing a policy to not release information about guests.

The Colorado National Guard — composed of both Air and Army Guard units totaling over 5,000 military personnel — will not say why or how soldiers will be using the facilities, but officials have confirmed that no other federal or local agencies will be using the rooms.

“All we’re concerned with is the National Guard personnel,” says Capt. Robert Bell, a public affairs officer for the Colorado National guard. “That’s what we asked for.”

Bell says the soldiers will be on duty and wearing personal protective equipment, which can include helmets and combat armor. He also said weapons will be kept in National Guard armories, in the city of Centennial south of Denver, and at Buckley Air Force Base in Aurora. Both Johnson & Wales University and Drury Hotels are less than 10 miles from the base.

Maj. Gen. H. Michael Edwards, who was appointed by Democratic Gov. Bill Ritter as the adjutant general for Colorado in 2007, oversees both Army and Air National Guard operations in the state.

Bell and Tracy said they do not know how much taxpayer money will be spent on the room rentals.

Judge: ‘Security’ trumps free speech
http://www.reuters.com/article/politicsNews/idUSN0619904520080807

Nothing says “Change” like 3,000 cops in riot gear ready to bash your skull in
http://www.theseminal.com/2008/08/06/n..change-like-3000-cops-in-riot-gear/

 



“Fusion Centers” to Gather Intelligence on Peaceful Protesters

“Fusion Centers” to Gather Intelligence on Peaceful Protesters

The Progressive

July 30, 2008

On the heels of the Maryland State Police spying scandal, the ACLU is ringing the alarms over “fusion centers.”

These are the state-by-state groupings of various law enforcement agencies working together at all levels, from local police to the FBI, NSA, and CIA, ostensibly to share terrorism threat information. But, as we saw in the Maryland case, they may sometimes just be sharing information about lawful, peaceful First Amendment-protected speech.

There is “mission creep from watching out for terrorism to watching out for peace activists,” said Caroline Fredrickson, director of the ACLU Washington Legislative Office, in a press conference July 29. She called the fusion centers an incipient “domestic intelligence apparatus.” And she warned that the kind of spying that occurred in Maryland was “very dangerous to our democracy.”

In December 2007, the ACLU published a report “What’s Wrong with Fusion Centers?”

It noted that there are more than 40 fusion centers already created. And it cited several problems with them, including the participation of military personnel in law enforcement, as well as “private sector participation.” “Fusion centers are incorporating private-sector corporations into the intelligence process, breaking down the arm’s length relationship that protects the privacy of innocent Americans who are employees or customers of these companies.”

On July 29, the ACLU issued an update to that report.

The fusion centers represent an attempt to create a “total surveillance society,” the update says.

It notes that the LAPD fed into its fusion center an array of ““suspicious activity reports” that included such innocuous activities as “taking notes” or “drawing diagrams” or “using binoculars.” (Since one out of six Americans is a birdwatcher, this last item could really swell the files.)

The “suspicious activity” criteria of the LAPD “gives law enforcement officers justification to harass practically anyone they choose, to collect personal information, and to pass such information along to the intelligence community,” the update says.

Frighteningly, the Office of the Director of National Intelligence has called the LAPD program “a national model.”

The Director of National Intelligence urges state and local law enforcement to “report non-criminal suspicious activities,” the update says. According to the standards of the Director of National Intelligence, these activities are defined as “observed behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal, or other illicit intention.”

The ACLU notes that “other illicit intention” is not defined, and that fusion centers are fed intelligence before “reasonable suspicion” is established.

Fusion centers also engage in data mining, as they rely not only on FBI and CIA records. They also often “have subscriptions with private data brokers such as Accurint, ChoicePoint, Lexis-Nexus, and LocatePlus, a database containing cell phone numbers and unpublished telephone records,” the ACLU notes, referring to a Washington Post article from April 2.

The ACLU calls fusion centers “out-of-control data-gathering monsters.”

While the government is gathering more and more information about us citizens, it’s trying to shield itself from telling us what it’s doing. “There appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws,” the ACLU notes. “For those living in Virginia, it’s already too late: The Virginia General Assembly passed a law in April 2008 exempting the state’s fusion center from the Freedom of Information Act.”

As I noted in “The New Snoops: Terrorism Liaison Officers, Some from the Private Sector”, the Department of Justice has come up with “Fusion Center Guidelines” that flat-out recommend that “fusion centers and their leadership encourage appropriate policymakers to legislate the protection of private sector data provided to fusion centers.”

The ACLU is absolutely right: Congress must investigate these fusion centers and exercise appropriate oversight before law enforcement agencies and their private sector partners violate the rights of more Americans and usher us all into the total surveillance society.

 

Bush turning intelligence agencies on Americans
Raw Story
July 31, 2008

President Bush seems to be slowly turning the nation’s massive surveillance apparatus upon its citizens, and some worry that administration assurances to protect civil liberties are nothing but empty promises.

With his update to a decades-old executive order governing the Intelligence Community, Bush is giving the Director of National Intelligence and the 16 agencies of the US Intelligence Community more power to access and share sensitive information on Americans with little to no independent oversight. The update to Executive Order 12333, first issued by former President Ronald Reagan, introduces a more prominent role for the Attorney General in approving intelligence gathering methods, calls for collaboration with local law enforcement agencies, eases limits on how information can be shared and urges cooperation between the IC and private companies.

“This Intelligence Community that was built to deal with foreign threats is now being slowly and incrementally turned inward,” says Mike German, policy counsel for the American Civil Liberties Union, in an interview with RAW STORY.

Bush’s latest update of a decades old executive order governing intelligence activities is a “lit fuse” that could end with the Constitution’s immolation, another ACLU official says.

“This kind of concentrated power, exercised in secret, is a lit fuse with our Constitution likely in danger of being burned,” said Caroline Fredrickson, director of the ACLU Washington legislative office.

The White House insists that the update to Executive Order 12333 maintains protections for Americans’ civil liberties, but senior administration officials who briefed reporters Thursday provided little reassurance that the new order would correct some of the Bush administration’s most egregious abuses.

Read Full Article Here

Peaceful Activist labeled a “terrorist” in a federally-funded domestic terrorism database
http://noworldsystem.com/2008/07/19/..d-spy-on-protest-groups/