noworldsystem.com


One Mainframe To Rule Them All

One Mainframe To Rule Them All

http://www.youtube.com/watch?v=XVWNlvI-eB4

http://www.youtube.com/watch?v=Rfv6WJ_h3rM

http://www.youtube.com/watch?v=G5k8R4AgQXU

http://www.youtube.com/watch?v=RjAbzghMioc

Video: RFID microchip propaganda

Google-Earth To Track People In Real-Time

Vehicle Tracking Devices and Road Taxes

 



Google-Earth To Track People In Real-Time

Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather

Cryptogon
September 30, 2009

http://www.youtube.com/watch?v=iGe2DGe_FFQ

The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.

Tice never did tell his story to Congress about this different aspect of the program.

Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.

Synthetic Environments for Analysis and Simulation

Via: Popular Science:

Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.

They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.

They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.

From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.

Up next, they say they want to add weather, birds, and motion in rivers.

 

Ubiquitous Computing: Big Brother’s All-Seeing Eye

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA building search engine for video surveillance footage

 



White House to collect personal info from Twitter, Facebook, Myspace Users

White House to collect personal info from Twitter, Facebook, Myspace Users

http://www.youtube.com/watch?v=ohQFxsPzO4s

Bill would give president emergency control of Internet

White House Calls for Citizens to Inform on Opponents of Obamacare

 



Australia To Enforce Mandatory Internet Censorship

Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter

Paul Joseph Watson
Prison Planet
October 29, 2008

The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.

A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.

The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.

The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.

Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).

Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”

Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.

This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.

Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.

Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.

The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.

If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.

Indeed, Prime Minister Tony Blair called for Internet censorship last year.

In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.

Moves to regulate the web have increased over the last two years.

– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.

– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.

– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”

– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.

– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.

– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.

– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.

– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.

– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.

– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.

– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.

– The EU also proposed legislation that would prevent users from uploading any form of video without a license.

– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”

Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.

 

DARPA building search engine for video surveillance footage

Ars Technica
October 21, 2008

The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.

According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.

The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.

Read Full Article Here

 

EU Set to Move ‘Internet of Things’ Closer to Reality

Daniel Taylor
Old-Thinker News
November 2, 2008

If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.

The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,

“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”

Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.

Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.

The Internet of Things

Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).

According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.

Reporting on the European Union’s pursuit of the IoT, iBLS reports,

“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”

The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.

Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.

South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports

“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’

An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.

A timeline shown in the April 2008 NIC report

The report outlines uses for the technology:

“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.

Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.

Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”

These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html

Security services want personal data from sites like Facebook

http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security

UK.gov says: Regulate the internet

http://www.theregister.co.uk/2008/10/20/government_internet_regulation/

 



’Einstein’ Program: The All-seeing eye of internet activity

’Einstein’ Program: The All-seeing eye of internet activity

Wayne Madsen
Online Journal
September 19, 2008

WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion dollar project called the “Einstein” program.

Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.

In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government’s computer and network security.

Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data.

In fact, WMR has learned that most of the classified technology being used for Einstein was developed for the NSA in conducting signals intelligence (SIGINT) operations on email networks in Russia. Code-named PINWHEEL, the NSA email surveillance system targets Russian government, military, diplomatic, and commercial email traffic and burrows into the text portions of the email to search for particular words and phrases of interest to NSA eavesdroppers. According to NSA documents obtained by WMR, there is an NSA system code-named ”PINWALE.”

The DNI and NSA also plan to move Einstein into the private sector by claiming the nation’s critical infrastructure, by nature, overlaps into the commercial sector. There are classified plans, already budgeted in so-called “black” projects, to extend Einstein surveillance into the dot (.) com, dot (.) edu, dot (.) int, and dot (.) org, as well as other Internet domains. Homeland Security Secretary Michael Chertoff has budgeted $5.4 billion for Einstein in his department’s FY2009 information technology budget. However, this amount does not take into account the “black” budgets for Einstein proliferation throughout the U.S. telecommunications network contained in the budgets for NSA and DNI.

In anticipation of the regulatory problems inherent in domestic email surveillance by the NSA, the Bush administration has ensured that the Federal Communications Commission (FCC) and industry associations have been stacked with pro-surveillance loyalists to ensure that Einstein is widely accepted and implemented.

 



Government to Share Info on Americans With Police

Government to Share Info on Americans With Police

Washington Post
August 16, 2008

The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years.

The proposed changes would revise the federal government’s rules for police intelligence-gathering for the first time since 1993 and would apply to any of the nation’s 18,000 state and local police agencies that receive roughly $1.6 billion each year in federal grants.

Quietly unveiled late last month, the proposal is part of a flurry of domestic intelligence changes issued and planned by the Bush administration in its waning months. They include a recent executive order that guides the reorganization of federal spy agencies and a pending Justice Department overhaul of FBI procedures for gathering intelligence and investigating terrorism cases within U.S. borders.

Read Full Article Here

 



Telecom & Internet Companies to Check Texts and E-mails

UK Telecom & Internet Companies to Check Texts and E-mails

Alan Travis
London Guardian
August 13, 2008

Local councils, health authorities and hundreds of other public bodies are to be given the power to access details of everyone’s personal text, emails and internet use under Home Office proposals published yesterday.

Ministers want to make it mandatory for telephone and internet companies to keep details of all personal internet traffic for at least 12 months so it can be accessed for investigations into crime or other threats to public safety.

The Home Office last night admitted that the measure will mean companies have to store “a billion incidents of data exchange a day”. As the measure is the result of an EU directive, the data will be made available to public investigators across Europe.

The consultation paper published yesterday estimates that it will cost the internet industry over £50m to store the mountain of data.

Conservatives and Liberal Democrats last night branded the measure a “snooper’s charter”.

When the measure was floated after the London bombings in 2005 by the then home secretary, Charles Clarke, it was justified on the grounds that it was needed to investigate terrorist plots and organised crime. But the Home Office document makes clear that the personal data will now be available for all sorts of crime and public order investigations and may even be used to prevent people self-harming.

Read Full Article Here

UN Report Blasts UK On Free Expression
http://www.guardian.co.uk/politics/2008/aug/15/labour.idcards

Zero Privacy In UK
http://www.guardian.co.uk/commentisfree/2008/aug/13/privacy.privacy

Google Ordered To Unmask Mystery Blogger
http://blog.wired.com/business/2008/08/google-ordered.html

Air Force Suspends ‘Cyber Command’ Program
http://www.informationweek.com/news..wArticle.jhtml?articleID=210003721

Blogging Is Not A Crime
http://www.techcrunch.com/20..-a-crime/comment-2439303