Filed under: 1984, ACTA, Big Brother, Censorship, Control Grid, copyright, Darpa, Dictatorship, Echelon, Empire, european union, Fascism, file sharing, global treaty, government control, government regulations, international treaty, internet, Internet 2, internet blackout, internet censorship, Internet Filtering, internet manipulation, internet police, internet regulations, manipulation, nanny state, orwell, Police State, Surveillance, world treaty
Global treaty could ban file-sharers from Internet after ‘three strikes’
File-sharers could be jailed under proposed ACTA provisions
Raw Story
November 4, 2009
Leaked details of the Anti-Counterfeiting Trade Agreement being negotiated in secret by most of the world’s largest economies suggest Internet file-sharers could be blocked from accessing the Internet if they are repeatedly accused of sharing copyrighted material, say media and digital-rights watchdogs.
And the worst-case scenario could see popular Web sites like YouTube and Flickr shut down because of a provision in the treaty that would force them to monitor everything uploaded to the site for copyright violations.
Internet law professor Michael Geist published details of “leaked” portions of the discussions on ACTA on his blog Tuesday, as a new round of ACTA negotiations began in Seoul, South Korea. The US, along with all the countries of the European Union as well as Japan, Canada, Australia and a handful of other countries, are involved in the negotiations.
“The provisions would pave the way for a globalized three-strikes and you’re out system,” Geist blogged Wednesday, referring to a proposal from copyright holders to have Internet service providers cut off service to anyone accused at least three times of illegally sharing copyrighted material.
Filed under: 1984, 3rd reich, 4th reich, Big Brother, biometrics, brain manipulation, cameras, cancer, Concentration Camp, Control Grid, corporatism, data mining, death camps, Dictatorship, digital angel, Echelon, Empire, endgame, Eugenics, Fascism, final solution, Genocide, global takeover, Globalism, government control, government takeover, gps, health and environment, Hitler, hollerith, Holocaust, IBM, internet of things, IOT, mandatory microchipping, manipulation, microchip, microchips, nanny state, Nazi, nazi germany, New World Order, NWO, Oppression, orwell, Police State, Population Control, Raytheon, RFID, RFID bracelet, Science and technology, slavery, Spy, Surveillance, surveillance cameras, swine flu, swine flu vaccine, Total Information Awareness, traffic cameras, Verichip, WHO | Tags: internet regulation, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, verimed, Video and Image Retrieval and Analysis Tool
One Mainframe To Rule Them All
Filed under: 1984, andrew Napolitano, Big Brother, biometrics, Control Grid, Dictatorship, DMV, Echelon, Empire, facial recognition, FBI, federal crimes, health care reform, illegal search, Judge Napolitano, Media, nanny state, obamacare, Oppression, orwell, police crimes, Police State, privacy rights, search warrant, Surveillance | Tags: dmv photo records, dmv photos
FBI Doing Facial Recognition Scans on DMV Photo Records
Filed under: 1984, augmented earth, Big Brother, biometrics, cameras, cell phone, cell phones, CNN, Control Grid, Darpa, data mining, Dictatorship, Echelon, Empire, global elite, global government, Globalism, google, google earth, government control, government takeover, gps, internet, Internet 2, internet 3, internet of things, internet police, IOT, Media, microchip, microchips, Microsoft, nanny state, New World Order, NWO, Oppression, orwell, Pentagon, Police State, RFID, RFID bracelet, Science and technology, south korea, Spy, Surveillance, surveillance cameras, Total Information Awareness, traffic cameras, uav, Verichip | Tags: intel, internet regulation, korea, motorola, National Intelligence Council, new songdo city, NIC, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool
Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather
Cryptogon
September 30, 2009
The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.
Tice never did tell his story to Congress about this different aspect of the program.
Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.
—Synthetic Environments for Analysis and Simulation
Via: Popular Science:
Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.
They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.
They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.
From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.
Up next, they say they want to add weather, birds, and motion in rivers.
Ubiquitous Computing: Big Brother’s All-Seeing Eye
Filed under: 1984, 4th amendment, Big Brother, Britain, car tax, Carbon Tax, Congress, Control Grid, Dictatorship, earl blumenauer, Echelon, Empire, Europe, european union, Fascism, global tax, gps, h.r. 3311, HR 3311, Income Tax, infrastructure, london, microchips, nanny state, Neolibs, Oppression, Oregon, orwell, Police State, portland, privacy rights, RFID, road tax, slavery, Spy, spy satellite, Surveillance, tax, Taxpayers, toll road, Toll Roads, Uncategorized, United Kingdom, US Constitution, US Treasury, Vehicle Miles Traveled tax
HR 3311: Vehicle Tracking Devices and Road Taxes
Noworldsystem.com
September 21, 2009
This is just one of many bills that is evidence that America is falling into an Orwellian police state, the eye of big government, tax slavery and despotism is becoming even more clear as the republic fades into the night.
Democratic Congressman Earl Blumenauer has introduced HR 3311, if passed the Senate would use $154 million of taxpayer money to fund the development of vehicle tracking devices and roadside RFID scanning devices that would record your everyday driving habits for the sake of creating a new taxation scheme and quite possibly help law enforcement penalize every mistake you make on the road. The money would also be used to research and study how to enforce this on a nationwide scale and how to present this scheme to the public as something necessary to fund failing infrastructures.
The bill will allow the US Treasury Department to establish this program which is called the “Road User Free Pilot Project” that was developed by Oregon legislators to impose a gas tax on Oregon motorists, the pilot program now studies the Vehicle Miles Traveled (VMT) tax instead, to better track and tax motorists. Within eighteen months of the HR 3311 passing the US Treasury would file an initial report outlining the best methods of adopting this new tax scheme on a nationwide scale.
Here’s what the bill’s sponsor, Congressman Blumenauer had to say about this insidious track and tax plan: “Oregon has successfully tested a Vehicle Miles Traveled (VMT) fee, and it is time to expand and test the VMT program across the country,”!
Just imagine all vehicles in the United States fitted with this federal tracking device, why don’t they just shackle us all and tax every footstep we make while they are at it!?! This is completely un-constitutional and threatens the 4th amendment of the United States constitution, I doubt that anyone would actually accept something this Orwellian to be used against them.. but of course I’m sure if this bill passes all new vehicles would be secretly fitted with these devices without anyone knowing about it.
Here is what we know the device is capable of recording:
1. The device can calculate miles driven based on GPS data
2. The device can store the number of miles driven
3. The device can determine when the vehicle has left certain states
4. The device can store the states the vehicle entered
5. The device can determine what time a vehicle was being driven
6. The device can store the times the vehicle was driven
7. The device can produce all data stored since its last reading
This device must be receiving precise positional data as an input from its GPS unit. It must also have a clock set to the real time and date as an input. This means that the device is getting data on the exact position of the vehicle at any moment, and that the control software is only storing certain data-points based on this. This is an adequate privacy safeguard, right? Probably not.
Considering this is a tax device, it will very likely need to be updated to reflect changes in the tax law. The need for this capability is clear. One year, the zone around Portland might incur a tax at any time of day, the next year only during rush hour. Oregon’s program might spread to other states, so now the control software in the device has to start recording miles driven in those states as well. If this is the case, then the control software could one day be updated in nearly any way, including complete tracking of movement and speed.
The other thing to consider is that the readers for these devices will be readily available, since every gas station in the state will need one. Even if the software stays the same, there’s nothing stopping a rogue police department from getting its hands on a reader and using it to gather info on people. More likely, though, if these devices became pervasive, law enforcement would push to have readers of their own.
Imagine this scenario: You’re driving a car with one of these GPS devices at the leisurely clip of 60 MPH on the highway leading into Klamath Falls. Like all highways in Oregon, the limit is still 55 MPH. A cop catches you going over the limit and pulls you over. You go through the normal rigmarole with him, except this time he checks your GPS devices and finds out that you’ve exceeded 55 MPH in the state of Oregon 22 times since the device was last read. You leave this encounter with 22 speeding tickets instead of one.
That scenario is possible with the hardware described in the device and minimal changes in the software. Only the good will of the Oregon state government is keeping it from being so. Should Oregonians really rely on that alone to protect their privacy? [Source]
Filed under: 1984, agriculture, Big Brother, biometrics, cargill, consolidation, Control Grid, department of agriculture, digital angel, Echelon, fda, food safety, global elite, global government, Globalism, gps, Mad Cow, mandatory microchipping, michigan, microchip, Monsanto, nanny state, New World Order, NWO, Oppression, organic, orwell, RFID, Science and technology, Spy, Surveillance, USDA, Verichip | Tags: internet of things, microchip implant cancer, National Animal Identification System, rfid cancer, Ubiquitous living, utopia
Amish farmers lose court battle against RFID
Beasts must still be numbered, says court
The Register
July 31, 2009
Michigan farmers have failed in their attempt to block the introduction of RFID tags for cattle, despite arguments about the cost and the risk of upsetting an otherwise benevolent deity.
The case was bought by the catchily-named Farm-to-Consumer Legal Defence Fund (FTCLDF), representing small farmers in Michigan as well as a group of six Amish farmers: the former concerned about the cost of the tags, while the latter were more worried about eternal damnation brought on by applying numbers to God’s own cattle.
The US Department of Agriculture (USDA) tried to get the case dismissed back in November last year, but only now has it managed to have the case thrown out on the basis that it is a Michigan ruling and thus subject to state laws, rather than part of any agenda being set by the USDA as part of the National Animal Identification System (NAIS), against which the plaintiff’s case was based.
Even in Michigan the law is intended to be voluntary, but the plaintiffs clearly believe that the voluntary status is just a ruse under which a mandatory ruling can be later implemented, which would threaten their livelihoods, or eternal souls, as appropriate. It’s worth noting, as the Judge did, that even Amish cattle already have numbered metal ear studs, so the contention that numbering cattle is against God’s law was already in shaky ground.
As for the USDA agenda, RFID Journal covers the case in some detail including quotes from a Michigan representative explaining:
“We implemented this program nearly 10 years ago… This was done pre-NAIS. Michigan is the only state with a mandatory electronic animal-tracking program, but it is also the only state with documented bovine TB cases”
Electronic tracking, in this instance, doesn’t necessarily mean RFID tags. The same thing can be, and is, achieved using the existing metal studs, with the data gathered electronically whenever the cattle are moved. But such assurances aren’t going to dent a good conspiracy theory about federal control.
National Animal Identification System
Insane Food Bill 2749 Passes House On 2nd Try. HR 2749: Totalitarian Control Of Our Food Supply
Filed under: 1984, 1st amendment, 9/11 Truth, Airport Security, Anti-War, Australia, Big Brother, biometrics, Bloggers, Britain, California, cashless society, cell phones, Censorship, China, Cold War, Congress, Control Grid, copyright, Darpa, data mining, DHS, Dictatorship, Dissent, Echelon, Empire, Europe, european union, facebook, False Flag, free speech, George Bush, Germany, global elite, global government, Globalism, google, gps, Homeland Security, inside job, internet, Internet 2, internet blackout, internet censorship, Internet Filtering, internet of things, internet police, IOT, IP, ISP, John McCain, john roberts, korea, london, Media, michael chertoff, microchip, microchips, Microsoft, nanny state, New World Order, New York, Oppression, orwell, Pentagon, Police State, Propaganda, RFID, RIAA, Science and technology, south korea, Spy, Surveillance, Tony Blair, uav, United Kingdom, US Constitution, Verichip, War On Terror, White House | Tags: HP, incheon, intel, internet regulation, john reid, korea, motorola, National Intelligence Council, new songdo city, NIC, NWO, paul otellini, privacy, Recording Industry Association of America, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool, VIRAT
Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter
Paul Joseph Watson
Prison Planet
October 29, 2008
The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.
A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.
The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.
The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.
Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).
Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”
Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.
This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.
Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.
Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.
The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.
If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.
Indeed, Prime Minister Tony Blair called for Internet censorship last year.
In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.
Moves to regulate the web have increased over the last two years.
– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.
– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.
– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”
– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.
– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.
– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.
– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.
– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.
– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.
– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.
– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.
– The EU also proposed legislation that would prevent users from uploading any form of video without a license.
– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”
Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.
DARPA building search engine for video surveillance footage
Ars Technica
October 21, 2008
The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.
According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.
The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.
EU Set to Move ‘Internet of Things’ Closer to Reality
Daniel Taylor
Old-Thinker News
November 2, 2008
If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.
The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,
“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”
Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.
Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.
The Internet of Things
Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).
According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.
Reporting on the European Union’s pursuit of the IoT, iBLS reports,
“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”
The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.
Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.
South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports
“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’”
An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.
A timeline shown in the April 2008 NIC report
The report outlines uses for the technology:
“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.
Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.
Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”
These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.
DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html
Security services want personal data from sites like Facebook
http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security
UK.gov says: Regulate the internet
http://www.theregister.co.uk/2008/10/20/government_internet_regulation/
Filed under: 1984, 4th amendment, Airport Security, Big Brother, biometrics, brain manipulation, Britain, cashless society, cell phones, Congress, consolidation, Control Grid, Echelon, Europe, european union, Germany, global elite, global government, Globalism, gps, internet, john roberts, london, Media, microchip, nanny state, New World Order, New York, Oppression, orwell, Police State, RFID, Science and technology, south korea, Spy, Surveillance, uav, United Kingdom, US Constitution, Verichip, zbigniew brzezinski | Tags: HP, hwaseong dongtan, incheon, intel, internet of things, korea, motorola, new songdo city, NWO, paul otellini, privacy, seoul, u-city, Ubiquitous living, utopia
Consolidation of U.S. Intelligence Into Global Intel Network by 2015
http://www.globalresearch.ca/index.php?context=va&aid=9752
http://news.cnet.com/8301-17938_105-10010..ss&tag=feed&subj=Crave
Passengers Details Should Be Given To Government
http://www.telegraph.co.uk/tra..uld-be-given-to-the-Government.html
Unmanned Spy Plans To Police Britain
http://www.independent.co.uk/ne..lice-britain-886083.html
Secret EU security draft risks uproar with call to pool policing and give US personal data
http://www.guardian.co.uk/world/2008/aug/07/eu.uksecurity
Governor Wants Speed Cameras On Interstates
http://www.suntimes.com/news/metro/bl..,CST-NWS-blago07.article
Filed under: 1984, 4th amendment, Big Brother, biometrics, Britain, cancer, cashless society, CCTV, Control Grid, Echelon, Europe, european union, FISA, gps, health and environment, london, Media, microchip, neocons, Oppression, orwell, Police State, prison industrial complex, RFID, Science and technology, spy satellite, Surveillance, United Kingdom, US Constitution, Verichip, War On Terror, warrantless search | Tags: lab rats
RFID Chip Implants Cause Cancer in Lab-Rats
Filed under: Alberto Gonzales, Big Brother, Bill Clinton, bin laden, CIA, co-intel pro, Control Grid, Darpa, Echelon, FBI, GCHQ, George Bush, Homeland Security, john ashcroft, NSA, Operation CHAOS, Operation TIPS, Patriot Act, paul wolfowitz, Pentagon, Police State, Surveillance, Total Information Awareness
FBI Wants Its Own Stasi
Steve Watson
Infowars.net
July 26, 2007
In a move startlingly similar to that of the East German government during the Cold war, the FBI wants to recruit thousands of covert informants in the US and work with the CIA to train them in an effort to expand and adopt more aggressive intelligence capabilities.
ABC’s The Blotter reports that according to a recent unclassified report to Congress, the FBI, driven by a 2004 directive from President Bush, wants to recruit more than 15,000 informants in the US, entailing a complete overhaul of its database systems at a cost of around $22 million.
The FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI did not respond to requests for comment on this story.
The move comes in addition to other proposals to expand the collection and analysis of data on U.S. persons , retain years’ worth of Americans’ phone records and even increase so-called “black bag” secret entry operations, the Blotter reports.
Though the FBI has decided not to completely adopt CIA training methods on recruiting informants, which include bribery, extortion, and other patently illegal acts, the two are to work closely together on the program.
Though the reasoning is, as ever, to target terror cells in the US, the report also states that “some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants”.
Within the last two years it has come to light that the FBI, along with the Pentagon and the NSA has been spying on antiwar activists, rights groups and peace campaigners within the US, labeling some of them as “terrorists” and placing them within their databases.
It appears operations are now to be stepped up to include the Stasi like recruiting of informants within such groups to report what is deemed to be politically subversive behavior among American citizens.
In 2004 the ACLU revealed that after the terrorist attacks of Sept. 11, 2001 sparked the Bush administration’s “war on terrorism,” Attorney General John Ashcroft scrapped an FBI guideline—enacted after the agency infiltrated numerous groups during the 1960s and 1970s Civil Rights Movement—that blocked its agents from spying on groups and individuals unless they were investigating a crime.
By scrapping that policy, Gen. Ashcroft was, “essentially encouraging FBI agents to do fishing expeditions to spy in mosques, in anti-war meetings … without any reasonable suspicion that a crime was being committed,” ACLU attorney Ben Wizner said.
In late 2005 lawmakers expressed concern that the FBI was aggressively pushing the powers of the anti-terrorist USA Patriot Act to get access to private phone and financial records of ordinary people.
Around the same time it was revealed that the Bush administration had secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without [obtaining] court-approved warrants.
Though this was dubbed by the corporate mainstream media to be “a major shift in American intelligence-gathering practices”, eavesdropping on citizens is nothing new, the only shift that has occurred is that the government can now TELL us that they’re spying on us and it will slowly be accepted.
If the mainstream media is to be believed, the National Security Agency engages in “some eavesdropping inside the country,” There are hundreds of sources that prove however that the intelligence services have been operating similar programs for decades.
The FBI itself has been targeting domestic groups since its inception, the most notorious example being Hoover’s COINTELPRO (Counter-Intelligence Program) which covertly spied on all manner of organizations and individuals from Dr. Martin Luther King to the National Lawyers Guild .
Operation CHAOS under the CIA highlights another example of domestic spying:
“In June 1970 Nixon met with Hoover [FBI], Helms [CIA], NSA Director Admiral Noel Gaylor, and Defense Intelligence Agency (DIA) representative Lt. Gen. Donald V. Bennett and told them he wanted a coordinated and concentrated effort against domestic dissenters,” Verne Lyon – former CIA undercover operative .
For over fifteen years, the CIA, with assistance from numerous government agencies, conducted a massive illegal domestic covert operation called Operation CHAOS. It was one of the largest and most pervasive domestic surveillance programs in the history of this country. Throughout the duration of CHAOS, the CIA spied on thousands of U.S. citizens. The CIA went to great lengths to conceal this operation from the public while every president from Eisenhower to Nixon exploited CHAOS for his own political ends.”
There are also multiple Pentagon projects in operation that involve the collection of intelligence through domestic eavesdropping. One example is the Defense Department’s Counterintelligence Field Activity (CIFA)
Consider this from William M. Arkin of the Washington Post :
“CIFA already has these authorities, has its own agents, and collects information on common American citizens under the guise of “sabotage” and “force protection” threats to the military. Since 9/11, functions that were previously intended to protect U.S. forces overseas from terrorism and protect U.S. secrets from spies have been combined in one super-intelligence function that constitutes the greatest threat to U.S. civil liberties since the domestic spying days of the 1970’s.”
“On May 2, 2003, Deputy Secretary of Defense Paul Wolfowitz signed a memorandum directing the military to collect and report “non-validated threat information” relating to U.S. military forces, installations or missions. His memorandum followed from the establishment of the Domestic Threat Working Group after 9/11, the intent of which was to create a mechanism to share low-level domestic “threat information” between the military and intelligence agencies.”
Then we have the ” Total Information Awareness ” program whereby every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.”
Shortly after the announcement of TIA, the Pentagon backtracked and told us that TIA was shutting down, but on reading the second paragraph in this article , it becomes clear that the tools are there waiting to be used. The Pentagon has since started up multiple programs all bearing exact similarities to TIA.
The Tools of TIA include “LifeLog” which is described as “a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch”. Another tool is the MATRIX database , A federally funded crime database run by multiple states at once.
Operation TIPS and similar programs were geared towards turning citizens themselves into domestic spies.
Then of course there is the joint NSA / Government Communications Head Quarters of England (GCHQ) Project Echelon . This long running operation was first exposed in the mid nineties and then again most prominently by author James Bamford in his 1999 book Body of Secrets. Bamford comments, “The cooperation between the Echelon countries is worrying. For decades, these organizations have worked closely together, monitoring communications and sharing the information gathered. Now, through Echelon, they are pooling their resources and targets, maximizing the collection and analysis of intercepted information.”
In the greatest surveillance effort ever established, the NSA global spy system captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world. Quite obviously they cannot listen to everyone anywhere ALL the time, but they have the capability to choose when to listen and who to listen to, wherever they may be.
James Bamford famously recalled how the NSA successfully intercepted satellite calls from Osama Bin Laden in the late nineties as he was talking to his mother.
“I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.” – Senator Frank Church, quoted in ECHELON: America’s Secret Global Surveillance Network
Under the Clinton Administration Echelon certainly turned its attention to citizens of countries everywhere and monitored millions of calls and other communications.
Echelon expert Mike Frost, who spent 20 years as a spy for the Canadian equivalent of the National Security Agency, told CBS’s “60 Minutes” that the agency was monitoring “everything from data transfers to cell phones to portable phones to baby monitors to ATMs.”
Domestic spying is nothing new, there has been at least half a century of such activity in America. However, the general public will believe that government spying on them is new, and secondly, they will just accept it because they are being told in a very unsophisticated fashion, that it is keeping them safe.
On Tuesday current Attorney General Alberto Gonzales once again gave testimony concerning the ongoing investigations into the legality of “terrorist surveillance program” and seemed to confirm that numerous domestic surveillance programs are in operation.
The fact that less than 0.01% of Homeland Security cases are related to terrorism in America begs the question why does America need an army of secret police to keep tabs on its own citizens?
Domestic government surveillance is becoming accepted as the norm. The fact remains however that you cannot have a free state that relies upon a covert network of government spies and recruited informants to maintain law and order within its own borders.