Filed under: 1984, augmented earth, Big Brother, biometrics, cameras, cell phone, cell phones, CNN, Control Grid, Darpa, data mining, Dictatorship, Echelon, Empire, global elite, global government, Globalism, google, google earth, government control, government takeover, gps, internet, Internet 2, internet 3, internet of things, internet police, IOT, Media, microchip, microchips, Microsoft, nanny state, New World Order, NWO, Oppression, orwell, Pentagon, Police State, RFID, RFID bracelet, Science and technology, south korea, Spy, Surveillance, surveillance cameras, Total Information Awareness, traffic cameras, uav, Verichip | Tags: intel, internet regulation, korea, motorola, National Intelligence Council, new songdo city, NIC, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool
Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather
Cryptogon
September 30, 2009
The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.
Tice never did tell his story to Congress about this different aspect of the program.
Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.
—Synthetic Environments for Analysis and Simulation
Via: Popular Science:
Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.
They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.
They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.
From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.
Up next, they say they want to add weather, birds, and motion in rivers.
Ubiquitous Computing: Big Brother’s All-Seeing Eye
Filed under: 1984, 1st amendment, 9/11 Truth, Airport Security, Anti-War, Australia, Big Brother, biometrics, Bloggers, Britain, California, cashless society, cell phones, Censorship, China, Cold War, Congress, Control Grid, copyright, Darpa, data mining, DHS, Dictatorship, Dissent, Echelon, Empire, Europe, european union, facebook, False Flag, free speech, George Bush, Germany, global elite, global government, Globalism, google, gps, Homeland Security, inside job, internet, Internet 2, internet blackout, internet censorship, Internet Filtering, internet of things, internet police, IOT, IP, ISP, John McCain, john roberts, korea, london, Media, michael chertoff, microchip, microchips, Microsoft, nanny state, New World Order, New York, Oppression, orwell, Pentagon, Police State, Propaganda, RFID, RIAA, Science and technology, south korea, Spy, Surveillance, Tony Blair, uav, United Kingdom, US Constitution, Verichip, War On Terror, White House | Tags: HP, incheon, intel, internet regulation, john reid, korea, motorola, National Intelligence Council, new songdo city, NIC, NWO, paul otellini, privacy, Recording Industry Association of America, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool, VIRAT
Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter
Paul Joseph Watson
Prison Planet
October 29, 2008
The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.
A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.
The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.
The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.
Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).
Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”
Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.
This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.
Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.
Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.
The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.
If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.
Indeed, Prime Minister Tony Blair called for Internet censorship last year.
In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.
Moves to regulate the web have increased over the last two years.
– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.
– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.
– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”
– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.
– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.
– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.
– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.
– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.
– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.
– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.
– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.
– The EU also proposed legislation that would prevent users from uploading any form of video without a license.
– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”
Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.
DARPA building search engine for video surveillance footage
Ars Technica
October 21, 2008
The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.
According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.
The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.
EU Set to Move ‘Internet of Things’ Closer to Reality
Daniel Taylor
Old-Thinker News
November 2, 2008
If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.
The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,
“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”
Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.
Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.
The Internet of Things
Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).
According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.
Reporting on the European Union’s pursuit of the IoT, iBLS reports,
“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”
The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.
Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.
South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports
“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’”
An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.
A timeline shown in the April 2008 NIC report
The report outlines uses for the technology:
“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.
Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.
Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”
These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.
DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html
Security services want personal data from sites like Facebook
http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security
UK.gov says: Regulate the internet
http://www.theregister.co.uk/2008/10/20/government_internet_regulation/
Filed under: 2-party system, 7/7, Air Force, Bloggers, Britain, civil liberties, civil rights, Control Grid, corporations, data mining, Dictatorship, Empire, Europe, european union, Fascism, free speech, google, internet, Internet Filtering, internet police, ISP, left right paradigm, london, nanny state, Nazi, neocons, Neolibs, Oppression, orwell, Police State, privacy rights, stasi, stasi tactics, Surveillance, telecoms, United Kingdom, united nations, War On Terror, warrantless search, warrantless wiretap | Tags: cyber security, cyber terrorism, e-mails, Home Office, snooper’s charter, texting
UK Telecom & Internet Companies to Check Texts and E-mails
Alan Travis
London Guardian
August 13, 2008
Local councils, health authorities and hundreds of other public bodies are to be given the power to access details of everyone’s personal text, emails and internet use under Home Office proposals published yesterday.
Ministers want to make it mandatory for telephone and internet companies to keep details of all personal internet traffic for at least 12 months so it can be accessed for investigations into crime or other threats to public safety.
The Home Office last night admitted that the measure will mean companies have to store “a billion incidents of data exchange a day”. As the measure is the result of an EU directive, the data will be made available to public investigators across Europe.
The consultation paper published yesterday estimates that it will cost the internet industry over £50m to store the mountain of data.
Conservatives and Liberal Democrats last night branded the measure a “snooper’s charter”.
When the measure was floated after the London bombings in 2005 by the then home secretary, Charles Clarke, it was justified on the grounds that it was needed to investigate terrorist plots and organised crime. But the Home Office document makes clear that the personal data will now be available for all sorts of crime and public order investigations and may even be used to prevent people self-harming.
http://www.guardian.co.uk/politics/2008/aug/15/labour.idcards
Zero Privacy In UK
http://www.guardian.co.uk/commentisfree/2008/aug/13/privacy.privacy
Google Ordered To Unmask Mystery Blogger
http://blog.wired.com/business/2008/08/google-ordered.html
Air Force Suspends ‘Cyber Command’ Program
http://www.informationweek.com/news..wArticle.jhtml?articleID=210003721
Blogging Is Not A Crime
http://www.techcrunch.com/20..-a-crime/comment-2439303
Filed under: 1984, 1st amendment, 2008 Election, Big Brother, Bloggers, Censorship, comcast, Congress, corporations, corporatism, Dictatorship, Empire, facism, FCC, free speech, google, house senate, internet, Internet 2, internet blackout, Internet Filtering, internet police, Media, Nazi, net neutrality, poll, Surveillance, US Constitution, Washington D.C. | Tags: robert mcdowell, targeted-advertising technology
Fairness Doctrine Might Give Control of Web Content to the Government
Business and Media Institute
August 12, 2008
There’s a huge concern among conservative talk radio hosts that reinstatement of the Fairness Doctrine would all-but destroy the industry due to equal time constraints. But speech limits might not stop at radio. They could even be extended to include the Internet and “government dictating content policy.”
FCC Commissioner Robert McDowell raised that as a possibility after talking with bloggers at the Heritage Foundation in Washington, D.C. McDowell spoke about a recent FCC vote to bar Comcast from engaging in certain Internet practices – expanding the federal agency’s oversight of Internet networks.
The commissioner, a 2006 President Bush appointee, told the Business & Media Institute the Fairness Doctrine could be intertwined with the net neutrality battle. The result might end with the government regulating content on the Web, he warned. McDowell, who was against reprimanding Comcast, said the net neutrality effort could win the support of “a few isolated conservatives” who may not fully realize the long-term effects of government regulation.
“I think the fear is that somehow large corporations will censor their content, their points of view, right,” McDowell said. “I think the bigger concern for them should be if you have government dictating content policy, which by the way would have a big First Amendment problem.”
“Then, whoever is in charge of government is going to determine what is fair, under a so-called ‘Fairness Doctrine,’ which won’t be called that – it’ll be called something else,” McDowell said. “So, will Web sites, will bloggers have to give equal time or equal space on their Web site to opposing views rather than letting the marketplace of ideas determine that?”
McDowell told BMI the Fairness Doctrine isn’t currently on the FCC’s radar. But a new administration and Congress elected in 2008 might renew Fairness Doctrine efforts, but under another name.
“The Fairness Doctrine has not been raised at the FCC, but the importance of this election is in part – has something to do with that,” McDowell said. “So you know, this election, if it goes one way, we could see a re-imposition of the Fairness Doctrine. There is a discussion of it in Congress. I think it won’t be called the Fairness Doctrine by folks who are promoting it. I think it will be called something else and I think it’ll be intertwined into the net neutrality debate.”
A recent study by the Media Research Center’s Culture & Media Institute argues that the three main points in support of the Fairness Doctrine – scarcity of the media, corporate censorship of liberal viewpoints, and public interest – are myths.
Some Web Firms Say They Track Behavior Without Explicit Consent
Ellen Nakashima
Washington Post
August 12, 2008
Several Internet and broadband companies have acknowledged using targeted-advertising technology without explicitly informing customers, according to letters released yesterday by the House Energy and Commerce Committee.
And Google, the leading online advertiser, stated that it has begun using Internet tracking technology that enables it to more precisely follow Web-surfing behavior across affiliated sites.
The revelations came in response to a bipartisan inquiry of how more than 30 Internet companies might have gathered data to target customers. Some privacy advocates and lawmakers said the disclosures help build a case for an overarching online-privacy law.
Filed under: 1984, 2008 olympics, beijing, Big Brother, CCTV, Censorship, China, civil liberties, civil rights, George Bush, google, human rights, internet, internet blackout, Internet Filtering, internet police, Iraq, neocons, olympics, Oppression, orwell, Police State, sam brownback, Senate, Spy, Surveillance, warrantless search, warrantless wiretap | Tags: falungong, falungong practitioners, Public Security Bureau
China Spying On Internet Use In Hotels
AP
July 29, 2008
Foreign-owned hotels in China face the prospect of “severe retaliation” if they refuse to install government software that can spy on Internet use by hotel guests coming to watch the summer Olympic games, a U.S. lawmaker said Tuesday.
Sen. Sam Brownback, R-Kan., produced a translated version of a document from China’s Public Security Bureau that requires hotels to use the monitoring equipment.
“These hotels are justifiably outraged by this order, which puts them in the awkward position of having to craft pop-up messages explaining to their customers that their Web history, communications, searches and key strokes are being spied on by the Chinese government,” Brownback said at a news conference.
A spokesman for the Chinese embassy in Washington did not immediately respond to a request for comment.
Brownback said several international hotel chains confirmed receiving the order from China’s Public Security Bureau. The hotels are in a bind, he said, because they don’t want to comply with the order, but also don’t want to jeopardize their investment of millions of dollars to expand their businesses in China. The hotel chains that forwarded the order to Brownback are declining to reveal their identities for fear of reprisal.
Earlier this year, the U.S. State Department issued a fact sheet warning travelers attending the Olympic games that “they have no reasonable expectation of privacy in public or private locations” in China.
“All hotel rooms and offices are considered to be subject to on-site or remote technical monitoring at all times,” the agency states.
The Public Security Bureau order threatens that failure to comply could result in financial penalties, suspending access to the Internet or the loss of a license to operate a hotel in China.
“If you were a human rights advocate, if you’re a journalist, you’re in room 1251 of a hotel, anything that you use, sending out over the Internet is monitored in real time by the Chinese Public Security bureau,” Brownback said. “That’s not right. It’s not in the Olympic spirit.”
Brownback and other lawmakers have repeatedly denounced China’s record of human rights abuses and asked President Bush not to attend the Olympic opening ceremonies in Beijing.
Brownback was introducing a resolution in the Senate on Tuesday that urges China to reverse its actions.
China To Censor Internet During Olympics
AP
July 29, 2008
China will censor the Internet used by foreign media during the Olympics, an organising committee official confirmed Wednesday, reversing a pledge to offer complete media freedom at the games.
“During the Olympic Games we will provide sufficient access to the Internet for reporters,” said Sun Weide, spokesman for the organising committee.
He confirmed, however, that journalists would not be able to access information or websites connected to the Falungong spiritual movement which is banned in China.
Other sites were also unavailable to journalists, he said, without specifying which ones.
Olympic panel ends ban, says Iraq can go to games
http://home.peoplepc.com/..3421_1334520080729-294375139
China Hits Back At U.S. Stands Firm On Internet
http://news.yahoo.com/s/afp/2008073..sGtapUp0mOsYxUinOROrgF
Google Says Privacy Doesn’t Exist, Get Used To Everyone Knowing Everything About You
http://www.informationweek.com/b..R0QSNDLPSKHSCJUNN2JVN
Filed under: 1984, 4th amendment, Big Brother, CIA, CNBC, corporations, corporatism, Dictatorship, Empire, Fascism, FBI, google, internet, Internet 2, internet police, IP, Nazi, orwell, pedophilia, Police State, Surveillance, US Constitution | Tags: court, data mining, Echelon, google searches, keywords
Google searches could be used against you in court
Filed under: Al Gore, antarctica, APS, Australia, Britain, carbon credit, carbon credit system, carbon credits, carbon dioxide, carbon ration, Carbon Tax, China, Co2, earth, Economy, environmental taxation, environmentalist, environmentalists, Eugenics, Europe, european union, false information, gas prices, global cooling, global tax, Global Warming, google, greenland, health and environment, ice age, icecaps, ipcc, Ivar Glaever, job market, jupiter, kyoto protocol, mars, Media Fear, middle class, noaa, Oil, Petrol, polar icecaps, Population Control, Propaganda, Russia, Science and technology, tax, Taxpayers, UN, United Kingdom, US Economy, WW2 | Tags: Dr. Richard Evans, el nino, Freeman Dyson, Fullcam, George Chilingar, Hadley Centre of Britain’s Meteorological Office, Institute of Oceanology of the Russian Academy of Scien, Jeffrey Marque, Leonid Khilyuk, Richard Lindzen, US National Council for Air and Stream Improvement
50,000 Scientists Disbelieve Global Warming
Daily Tech
July 17, 2008
Related: APS warned not to debate global warming
The American Physical Society, an organization representing nearly 50,000 physicists, has reversed its stance on climate change and is now proclaiming that many of its members disbelieve in human-induced global warming. The APS is also sponsoring public debate on the validity of global warming science. The leadership of the society had previously called the evidence for global warming “incontrovertible.”
In a posting to the APS forum, editor Jeffrey Marque explains,”There is a considerable presence within the scientific community of people who do not agree with the IPCC conclusion that anthropogenic CO2 emissions are very probably likely to be primarily responsible for global warming that has occurred since the Industrial Revolution.”
The APS is opening its debate with the publication of a paper by Lord Monckton of Brenchley, which concludes that climate sensitivity — the rate of temperature change a given amount of greenhouse gas will cause — has been grossly overstated by IPCC modeling. A low sensitivity implies additional atmospheric CO2 will have little effect on global climate.
Larry Gould, Professor of Physics at the University of Hartford and Chairman of the New England Section of the APS, called Monckton’s paper an “expose of the IPCC that details numerous exaggerations and “extensive errors”
In an email to DailyTech, Monckton says, “I was dismayed to discover that the IPCC’s 2001 and 2007 reports did not devote chapters to the central ’climate sensitivity’ question, and did not explain in proper, systematic detail the methods by which they evaluated it. When I began to investigate, it seemed that the IPCC was deliberately concealing and obscuring its method.”
According to Monckton, there is substantial support for his results, “in the peer-reviewed literature, most articles on climate sensitivity conclude, as I have done, that climate sensitivity must be harmlessly low.”
Monckton, who was the science advisor to Britain’s Thatcher administration, says natural variability is the cause of most of the Earth’s recent warming. “In the past 70 years the Sun was more active than at almost any other time in the past 11,400 years … Mars, Jupiter, Neptune’s largest moon, and Pluto warmed at the same time as Earth.”
Global Warming Conclusively Debunked As Gore Calls For CO2 Tax
The seven graphs that dispel alarmist claims about climate change
Paul Joseph Watson
Prison Planet
July 18, 2008
Related: Gore lets his mask slip : Tax the poor more than the rich
The world is cooling, sea levels are falling, ice is spreading, there are fewer extreme weather events, and it was hotter 1000 years ago, yet the myth of global warming is providing governments the excuse to micromanage every aspect of our lives, with Al Gore now openly calling for a carbon tax on the energy we use.
Following the end of the Sun’s most active period in over 11,000 years, the last 10 years have displayed a clear cooling trend as temperatures post-1998 leveled out and are now plummeting.
But such figures won’t deter the agenda of control freaks like Al Gore, who last night publicly called for a carbon tax to be imposed on the use of fossil fuels at a time when even middle class families are struggling to pay the bills as a result of a crippled economy, soaring oil prices and inflation.
Andrew Bolt of the Australian Sun-Herald has put together a series of graphs based on numbers from a plethora of scientific bodies to prove that the most alarmist claims about climate change are not only unproven, but in fact the complete opposite of what man-made global warming advocates proclaim is now being observed.
“That’s why 31,000 other scientists, including world figures such as physicist Prof Freeman Dyson, atmospheric physicist Prof Richard Lindzen and climate scientist Prof Fred Singer, issued a joint letter last month warning governments not to jump on board the global warming bandwagon,” writes Bolt.
“There is no convincing scientific evidence that human release of carbon dioxide, methane, or other greenhouse gases is causing or will, in the foreseeable future, cause catastrophic heating of the earth’s atmosphere and disruption of the earth’s climate.”
That’s why Ivar Glaever, who won a Nobel Prize for Physics, this month declared “I am a sceptic”, because “we don’t really know what the actual effect on the climate is”.
And it’s why the American Physical Society this month said “there is a considerable presence within the scientific community of people who do not agree with the (Intergovernmental Panel on Climate Change) conclusion that anthropogenic CO2 emissions are very probably likely to be primarily responsible for the global warming that has occurred since the Industrial Revolution.”
The first graph, obtained from the Hadley Centre of Britain’s Meteorological Office, shows how temperatures dropped, leveled off, and are now displaying a clear cooling trend, since their 1998 peak which was caused by the “El Nino” weather phenomenon, which is completely natural and has nothing to do with CO2 emissions.
Click here for full PDF format.
The figures mesh with anecdotal evidence of a cooling pattern – China recently experienced its coldest winter in 100 years while northeast America was hit by record snow levels and Britain suffered its coldest April in decades as late-blooming daffodils were pounded with hail and snow on an almost daily basis. The British summer has also left many yearning for global warming, with temperatures in June and July rarely struggling to get over 16 degrees and on one occasion even dropping as low as 9 degrees in the middle of the afternoon.
A common claim of behalf of Al Gore and the Church of Environmentalism, and one vividly portrayed in the Hollywood movie The Day After Tomorrow, is a predicted catastrophic rise in sea levels as a result of global warming.
In actual fact, figures from the Colorado Centre For Astrodynamics Research show that global sea levels, after having risen since 2000, have been falling significantly over the last 2 years.
In addition, according to the US National Oceanic and Atmospheric Administration, sea ice has grown rapidly in that same time frame and there is now more ice in the world than usually observed.
Click here for full size PDF of all graphs.
Another common cry from the alarmists is the contention that global warming is causing extreme weather events. Despite there having been far more violent and devastating weather events before the post World War 2 rise in CO2 levels, every flood, hurricane, tornado or cyclone is blamed on human-induced climate change.
The facts tell a different story. According to the American Meteorological Society, global warming hasn’t given us more cyclones, hurricanes, or tornados.
Furthermore, scaremongering about droughts attributed the global warming is disproved by the fact that levels of rainfall have increased.
Hysterical phony environmentalists like to imagine that the world has never been hotter, despite the fact that the planet has violently swung between extremes of temperature for eons.
New figures from the US National Council for Air and Stream Improvement debunk the IPCC’s notoriously controversial “hockey stick” graph and illustrate that the earth was a warmer place 1000 years ago. During such times, farmers in Greenland grew crops and even cultivated vineyards on a land mass that is now over 80% ice covered.
Despite evidence pouring in that the planet has naturally turned course and now embarked on a cooling trend, wild rhetoric, fearmongering, lecturing and bullying about the necessity for us to accept intrusions into our rights of mobility, privacy and behavior in the interests of saving the earth is at an all time high.
Global corporations and governments have joined forces to launch a united propaganda assault about how we must turn “green” while all the real environmental crises – deforestation, GM crops, chemtrails, genetic splicing, and cancer-causing cellphone tower radiation – are completely ignored.
Top Rocket Scientist: No Evidence CO2 Causes Global Warming
Paul Joseph Watson
Prison Planet
July 22, 2008
The campaign to force people to accept that “the debate is over” and that man-made CO2 emissions are driving climate change is in deep trouble, with another top global warming advocate – rocket scientist and carbon accounting expert Dr. Richard Evans – completely reversing his position.
Evans was a consultant to the Australian Greenhouse Office from 1999 to 2005 and he wrote the carbon accounting model (FullCAM) that measures Australia’s compliance with the Kyoto Protocol.
In an article for The Australian newspaper, Evans highlights why he was so keen to jump on board the man-made explanation without there being any clear conclusion as to what was driving temperature increases in the period from the end of the 70’s to 1998.
“The evidence was not conclusive, but why wait until we were certain when it appeared we needed to act quickly?” writes Evans. “Soon government and the scientific community were working together and lots of science research jobs were created. We scientists had political support, the ear of government, big budgets, and we felt fairly important and useful (well, I did anyway). It was great. We were working to save the planet.”
“But since 1999 new evidence has seriously weakened the case that carbon emissions are the main cause of global warming, and by 2007 the evidence was pretty conclusive that carbon played only a minor role and was not the main cause of the recent global warming,” he concludes.
Evans points out that the “greenhouse signature” that would indicate CO2 emissions are driving temperature increases – “a hot spot about 10km up in the atmosphere over the tropics” – which would be evident if climate change was man-made, is simply non-existent.
“If there is no hot spot then an increased greenhouse effect is not the cause of global warming. So we know for sure that carbon emissions are not a significant cause of the global warming,” he writes.
Evans highlights data collected from satellites positioned around the globe that indicates temperatures have dropped about 0.6C in the past year – back to 1980 levels. Such figures are complimented by anecdotal evidence of a cooling pattern – China recently experienced its coldest winter in 100 years while northeast America was hit by record snow levels and Britain suffered its coldest April in decades as late-blooming daffodils were pounded with hail and snow on an almost daily basis.
Evans also cites historical climate change and the fact that CO2 does not cause, but in fact lags behind temperature increase by as much as 800 years.
“The new ice cores show that in the past six global warmings over the past half a million years, the temperature rises occurred on average 800 years before the accompanying rise in atmospheric carbon. Which says something important about which was cause and which was effect,” he writes.
“The last point was known and past dispute by 2003, yet Al Gore made his movie in 2005 and presented the ice cores as the sole reason for believing that carbon emissions cause global warming. In any other political context our cynical and experienced press corps would surely have called this dishonest and widely questioned the politician’s assertion,” writes Evans.
Two Peer-Reviewed Scientific Papers Debunk CO2 Myth
Paul Joseph Watson
Prison Planet
July 16, 2008
Three top scientists have once again contradicted the claim that a “consensus” exists about man-made global warming with research that indicates CO2 emissions actually cool the atmosphere, in addition to another peer-reviewed paper that documents how the IPCC overstated CO2’s effect on temperature by as much as 2000 per cent.
Professor George Chilingar and Leonid Khilyuk of the University of Southern California, and Oleg Sorokhtin of the Institute of Oceanology of the Russian Academy of Sciences have released a study that they claim completely contradicts the link between CO2 and global temperature increases.
“The writers investigated the effect of CO2 emission on the temperature of atmosphere. Computations based on the adiabatic theory of greenhouse effect show that increasing CO2 concentration in the atmosphere results in cooling rather than warming of the Earth’s atmosphere,” states the preamble to the paper.
The full study, which appears in the Energy Sources journal, is sure to cause ire amongst climate cult adherants.
No global warming has been observed for the past 10 years as temperatures have gradually declined and studies indicate that there will be no further warming for the next 10 years.
In a related development, the peer-reviewed Physics and Society journal has published evidence proving that the UN IPCC’s 2007 climate summary “overstated CO2’s impact on temperature by 500-2000%.”
According to the paper, “Computer models used by the UN’s climate panel (IPCC) were pre-programmed with overstated values for the three variables whose product is “climate sensitivity” (temperature increase in response to greenhouse-gas increase), resulting in a 500-2000% overstatement of CO2’s effect on temperature in the IPCC’s latest climate assessment report, published in 2007.”
The paper also outlines evidence to confirm that Mars, Jupiter, Neptune’s largest moon, and Pluto warmed at the same time as Earth warmed, a factor attributed to the Sun having been more active than at almost any other time in the past 11,400 years.
The paper concludes, “CO2 enrichment will add little more than 1 °F (0.6 °C) to global mean surface temperature by 2100.”
Recent News:
http://worldpressnetwork.net/forum/viewtopic.php?f=2&t=349
Propaganda: Eating Less Helps The Environment
http://www.physorg.com/news136028669.html
Propaganda: Population Growth a Bigger Threat Than Global Warming
http://www.canberratimes.com.au..ticks-louder-than-climate/1173782.aspx
Chemical companies making more money gaming the carbon credit system than producing chemicals
http://blogs.wsj.com/environmentalc..game-the-carbon-markets/
Fossil Suggests Antarctica’s Warmer In Past
http://news.yahoo.com/s/livescience/fossilsuggestsantarcticamuchwarmerinpast
Global Warming Enforcement: The New Segregation
http://www.prisonplanet.com/global-w..ement-the-new-segregation.html
Killing Jobs to Save the Climate
http://www.spiegel.de/international/business/0,1518,566441,00.html
Google Trends (US and UK) illustrates the public’s fading interest in global warming
http://tomnelson.blogspot.com/2008/07/google-trends-us-and-uk-illustrates.html
Green Car Tax Will Hit Poor Hardest
http://www.telegraph.co.uk/motoring/ma..ing/2008/07/10/mroadtax410.xml
Propaganda: Scientists examine cow farts to reduce Global Warming
http://www.telegraph.co.uk/n..stic-tank-for-global-warming-study.html
No Smoking Hot Spots
APS warned not to debate global warming
TV Station Censured Over Climate Change Film
Apocalypse? No! – Why there is no Global Warming Crisis
President George Bush: ’Goodbye from the world’s biggest polluter’
Filed under: 1984, 1st amendment, 4th amendment, Airport Security, apple, army, Big Brother, Bloggers, Britain, Canada, cell phone, Control Grid, Europe, european union, free speech, google, hackers, India, internet, Internet 2, internet police, ISPs, Mi5, New York, NSA, Police State, Posse Comitatus, Surveillance, United Kingdom, US Constitution, viacom, War On Terror, Youtube | Tags: Department of Telecom, ipod, RIM
Big Brother database recording all our calls, texts and e-mails will ’ruin British way of life’
Daily Mail
July 16, 2008
Plans for a massive database snooping on the entire population were condemned yesterday as a ‘step too far for the British way of life’.
In an Orwellian move, the Home Office is proposing to detail every phone call, e-mail, text message, internet search and online purchase in the fight against terrorism and other serious crime.
But the privacy watchdog, Information Commissioner Richard Thomas, warned that the public’s traditional freedoms were under grave threat from creeping state surveillance.
Apart from the Government’s inability to hold data securely, he said the proposals raised ‘grave questions’.
‘Do the risks we face provide justification for such a scheme in the first place? Do we want the state to have details of more and more aspects of our private lives?
‘Whatever the benefits, would such a scheme amount to excessive surveillance? Would this be a step too far for the British way of life?’
It is thought the scheme would allow the police or MI5 to access the exact time when a phone call was made, the number dialled, the length of the call and, in the case of mobile phones, the location of the handset to within an accuracy of a few hundred yards.
Similarly for e-mails, it would provide details of when they were sent and who the recipients were. Police recovering a suspect’s computer would then be able to trawl through hard-drive records and recover particular messages. The content of telephone calls could not be recovered unless they were being intercepted at the time.
Mr Thomas’s warnings were backed by privacy campaigners, who claimed such Big Brother powers would give Government agencies unprecedented abilities to trawl through intimate details of ordinary people’s private lives at will.
He used the launch of his annual report to speak out after ministers signalled their intentions in their programme of legislation earlier this year, describing the new Bill as ‘modifying procedures for acquiring communications data’.
There are fears that the data will be shared with foreign governments – such as the Americans demanding personal details of air passengers – accessed by internet hackers or lost by bungling civil servants.
Opponents pointed out that town halls are already using extraordinary surveillance powers under the controversial Regulation of Investigatory Powers Act to investigate minor issues such as littering, or checking whether parents are abusing school catchment area rules, and they could be given access to almost unthinkable levels of personal data under the new scheme.
Currently police and MI5 can access customer records stored by telephone companies, but only with a warrant to examine individual accounts.
Mr Thomas said: ‘I am absolutely clear that the targeted and duly-authorised interception of the communications of suspects can be invaluable in the fight against terrorism and other serious crime.
‘But there needs to be the fullest public debate about the justification for, and implications of, a specially created database – potentially accessible to a wide range of law enforcement authorities – holding details of everyone’s telephone and internet communications.
’Do we really want the police, security services and other organs of the state to have access to more and more aspects of our private lives?’
Opposition MPs said the Government’s dismal records on safeguarding private data – most notably the loss of the entire child benefit database holding millions of people’s financial details – showed it was incapable of safeguarding such a vast volume of information safely, and the scheme should be dropped immediately.
An estimated 3billion emails are sent in Britain every day and last year 57billion text messages were sent.
The Home Office yesterday defended the need to keep its surveillance powers up to date with changing internet technology, and said full details of the plans would be published this year as part of a new Communications Data Bill.
Officials said the internet was rapidly revolutionising communications and it was vital for surveillance powers to keep up with technology in order to fight serious crime and terrorism.
India: NSA to tap data traffic passing through Blackberry devices
Business Line
July 13, 2008
New Delhi, July 12 – In a bid to find a solution to the security concerns around Blackberry services, the National Security Adviser is now supervising a discussion between National Test Research Organisation, under the Home Ministry, Department of Telecom and Canada-based Research In Motion.
The discussions are being held to find a spot on RIM’s network where the data traffic passing through Blackberry could be intercepted by security agencies.
The agencies had earlier rejected any temporary solution to the Blackberry controversy and told the Government that it must make sure that traffic originating and terminating on the device should not travel outside the country without proper monitoring.
DoT was considering deploying certain software that would allow the security agencies to snoop into Blackberry network without having to break into the service codes.
Blackberry handsets are designed by Research In Motion and uses high encryption code, making it impossible for the Indian agencies to monitor data being transmitted by users.
The DoT had earlier asked the company to set up a local server in the country which would allow the security forces to snoop into the network. However, Research In Motion said that it was not possible to give decryption codes or set up a local data centre in the country.
The DoT had earlier asked RIM to give its codes to Indian security agencies that will enable them to monitor the data being transmitted through Blackberry. The key problem was that Indian agencies do not have the required technology to monitor data that has encryption codes higher than 40 bits.
On the issue of setting up a local data centre within the country, RIM had said that Blackberry was designed to perform as a global system independent of geography. “The location of data centres and the customer’s choice of wireless network are irrelevant factors from a security perspective since end-to-end encryption is utilised,” RIM had said.
http://www.nytimes.com/2008/0..er=MYWAY&pagewanted=print
YouTube, Viacom Agree To Anonymize Data
http://news.yahoo.com/s/ap/20..hxV5G7yprV84FDlzM55TmZk24cA
Canadian ISPs Plan Net Censorship
http://www.americanfreepress.net/html/canada_net_censorship.html
Airport scans for illegal downloads on iPods, mobile phones and laptops
http://www.telegraph.co.uk/conn..nected/2008/07/10/nairport110.xml
Army Forms Network Warfare Batallion
http://www.strategypage.com/htmw/htiw/articles/20080712.aspx
Filed under: 4th amendment, ACTA, army, Britain, brussels, corporations, corporatism, DHS, Dictatorship, Empire, Europe, european union, FCC, g8, global elite, global government, Globalism, google, Homeland Security, internet, Internet 2, internet blackout, Internet Filtering, internet police, london, mediaopoly, nanny state, New World Order, Oppression, paris, Police State, Posse Comitatus, telecom, United Kingdom, US Constitution, viacom, virgin, Youtube | Tags: copyrighted material, ffii, firefox, google spycar, mYsql, openx, php, Saul Klein, skype, zend
Internet Police State: G8 Ratifies Crackdown on Illegal Downloads
Charles Arthur
London Guardian
July 10, 2008
The heads of the G8 governments, meeting this week, are about to ratify the Anti-Counterfeiting Trade Agreement (ACTA), which – it’s claimed – could let customs agents search your laptop or music player for illegally obtained content. The European Parliament is considering a law that would lead to people who illicitly download copyrighted music or video content being thrown off the internet. Virgin Media is writing to hundreds of its customers at the request of the UK record industry to warn them that their connections seem to have been used for illegal downloading. Viacom gets access to all of the usernames and IP addresses of anyone who has ever used YouTube as part of its billion-dollar lawsuit in which it claims the site has been party to “massive intentional copyright infringement”.
It seems that 20th-century ideas of ownership and control – especially of intellectual property such as copyright and trademarks – are being reasserted, with added legal muscle, after a 10-year period when the internet sparked an explosion of business models and (if we’re honest) casual disregard, especially of copyright, when it came to music and video.
But do those separate events mark a swing of the pendulum back against the inroads that the internet has made on intellectual property?
‘A finger in the dyke’
Saul Klein, a venture capitalist with Index Ventures who has invested in the free database company MySQL, Zend (the basis of the free web-scripting language PHP) and OpenX, an open-source advertising system, is unconvinced. “In a world of abundance – which the internet is quintessentially – that drives the price of everything towards ‘free’,” he says. “People don’t pay for any content online. Not for music, not for video. They get it, either legally or illegally.”
Is that sustainable? “The model of suing your best customers and subpoenaing private information is doomed to failure,” Klein observes. “It’s putting a finger in the dyke. It won’t change the macro trend, which is that there’s an abundance of information. Copyright owners need to find new ways to generate income from their product. The fact is, the music industry is in rude health – more people than ever before are going to concerts, making it, listening to it. It’s the labels that are screwed. The artists and managers are making money. The labels aren’t.
Europe votes on anti-piracy laws
BBC
July 7, 2008
Europeans suspected of putting movies and music on file-sharing networks could be thrown off the web under proposals before Brussels.
The powers are in a raft of laws that aim to harmonise the regulations governing Europe’s telecom markets.
Other amendments added to the packet of laws allow governments to decide which software can be used on the web.
Campaigners say the laws trample on personal privacy and turn net suppliers into copyright enforcers.
Piracy plan
MEPs are due to vote on the so-called Telecom Packet on 7 July. The core proposals in the packet were drawn up to help European telecoms firms cope with the rapid pace of change in the industry.
Technological and industry changes that did not respect borders had highlighted the limitations of Europe’s current approach which sees national governments oversee their telecoms markets.
“The current fragmentation hinders investment and is detrimental to consumers and operators,” says the EU document laying out the proposals.
But, say digital rights campaigners, anti-piracy lobbyists have hijacked the telecoms laws and tabled amendments that turn dry proposals on industry reform into an assault on the freedom of net users.
Among the amendments are calls to enact a Europe-wide “three strikes” law. This would see users banned from the web if they fail to heed three warnings that they are suspected of putting copyrighted works on file-sharing networks.
In addition it bestows powers on governments to decide which programs can be “lawfully” used on the internet.
A coalition of European digital rights groups have banded together to galvanise opposition.
“[The amendments] pave the way for the monitoring and filtering of the internet by private companies, exceptional courts and Orwellian technical measures,” said Christophe Espern, co-founder of French rights group La Quadrature du Net (Squaring the Net) in a statement.
The UK’s Open Rights Group said the laws would be “disproportionate and ineffective”.
The Foundation for a Free Internet Infrastructure (FFII) warned that if the amendments were accepted they would create a “Soviet internet” on which only software and services approved by governments would be allowed to run.
“Tomorrow, popular software applications like Skype or even Firefox might be declared illegal in Europe if they are not certified by an administrative authority,” warned Benjamin Henrion, FFII representative in Brussels, in a statement.
“This is compromising the whole open development of the internet as we know it today,” he said.
U.S. Homeland Security Defends Laptop Searches At Border
Christian Science Monitor
July 11, 2008
Is a laptop searchable in the same way as a piece of luggage? The Department of Homeland Security believes it is.
For the past 18 months, immigration officials at border entries have been searching and seizing some citizens’ laptops, cellphones, and BlackBerry devices when they return from international trips.
In some cases, the officers go through the files while the traveler is standing there. In others, they take the device for several hours and download the hard drive’s content. After that, it’s unclear what happens to the data.
The Department of Homeland Security contends these searches and seizures of electronic files are vital to detecting terrorists and child pornographers. It also says it has the constitutional authority to do them without a warrant or probable cause.
But many people in the business community disagree, saying DHS is overstepping the Fourth Amendment bounds of permissible routine searches. Some are fighting for Congress to put limits on what can be searched and seized and what happens to the information that’s taken. The civil rights community says the laptop seizures are simply unconstitutional. They want DHS to stop the practice unless there’s at least reasonable suspicion.
Legal scholars say the issue raises the compelling and sometimes clashing interests of privacy rights and the need to protect the US from terrorists and child pornographers. The courts have long held that routine searches at the border are permissible, simply because they take place at the border. Opponents of the current policy say a laptop search is far from “routine.”
“A laptop can hold [the equivalent of] a major university’s library: It can contain your full life,” says Peter Swire, a professor of law at Ohio State University in Columbus. “The government’s never gotten to search your entire life, so this is unprecedented in scale what the government can get.”
http://www.smh.com.au/news/pe..06/09/1212863545123.html
FCC Chairman Seeks to End Comcast’s Delay of File Sharing
http://www.washingtonpost.com/w..08/07/11/AR2008071102917.html
They’re Watching Us: U.S. Army Contract for “Internet Awareness Services”
https://www.fbo.gov/index?tab..218cda1e&cck=1&au=&ck=
Google’s spycar revs up UK privacy fears
http://www.theregister.co.uk/2008/07/07/google_spycar_slammed/
Viacom to Violate YouTube User’s Privacy
http://noworldsystem.com/2008/07/10/..-user%e2%80%99s-privacy/
Filed under: 1984, 4th amendment, Big Brother, California, corporations, corporatism, EFF, google, internet, Internet 2, Internet Filtering, internet police, Media, mediaopoly, mtv, Police State, Surveillance, US Constitution, Youtube | Tags: copyrighted material
Viacom to Violate YouTube User’s Privacy
Bloomberg
July 4, 2008
Google Inc., owner of the YouTube video-sharing Web site, may be exposed to heightened privacy complaints from Internet users after a U.S. judge ordered it to give Viacom Inc. a database about online viewers.
Google was ordered two days ago to turn over records of videos viewed on YouTube, the login name of viewers and their computer’s Internet address. Google already faces scrutiny over its storage of user data in the U.S. and Europe.
“The chickens have come home to roost for Google,’’ said Simon Davies, director of Privacy International in London. “If they were going to unnecessarily keep this information, there was always the chance someone was going to grab it.’’
Viacom, owner of Comedy Central and MTV television networks, wants the information to find out if YouTube viewers watch copyrighted shows, in an effort to bolster its $1 billion infringement lawsuit against Google. The ruling may lead some Web surfers to avoid using Google, which makes money based on traffic to and from its Web sites.
Google, owner of the most-used Internet search engine, has resisted attempts to get at its troves of user data. In 2006, the company fought a U.S. subpoena for months as it sought to assure users that their search records weren’t easily accessible. Google founder Sergey Brin said it’s the Mountain View, California-based company’s “obligation’’ to protect users’ privacy.
Filed under: 1984, 4th amendment, army, Big Brother, google, internet, Internet 2, internet police, Military, Military Industrial Complex, mtv, Posse Comitatus, Surveillance, US Constitution, viacom, War On Terror, Youtube | Tags: EFF, electronic frontier foundation
U.S. Military To Patrol Internet
UPI
June 30, 2008
The U.S. military is looking for a contractor to patrol cyberspace, watching for warning signs of forthcoming terrorist attacks or other hostile activity on the Web.
“If someone wants to blow us up, we want to know about it,” Robert Hembrook, the deputy intelligence chief of the U.S. Army’s Fifth Signal Command in Mannheim, Germany, told United Press International.
In a solicitation posted on the Web last week, the command said it was looking for a contractor to provide “Internet awareness services” to support “force protection” — the term of art for the security of U.S. military installations and personnel.
“The purpose of the services will be to identify and assess stated and implied threat, antipathy, unrest and other contextual data relating to selected Internet domains,” says the solicitation.
Hembrook was tight-lipped about the proposal. “The more we talk about it, the less effective it will be,” he said. “If we didn’t have to put it out in public (to make the contract award), we wouldn’t have.”
He would not comment on the kinds of Internet sites the contractor would be directed to look at but acknowledged it would “not (be) far off” to assume violent Islamic extremists would be at the top of the list.
The solicitation says the successful contractor will “analyze various Web pages, chat rooms, blogs and other Internet domains to aggregate and assess data of interest,” adding, “The contractor will prioritize foreign-language domains that relate to specific areas of concern … (and) will also identify new Internet domains” that might relate to “specific local requirements” of the command.
Officials were keen to stress the contract covered only information that could be found by anyone with a computer and Internet connection.
“We’re not interested in being Big Brother,” said LeAnne MacAllister, chief spokeswoman for the command, which runs communications in Europe for the U.S. Army and the military’s joint commands there.
“I would not characterize it as monitoring,” added Hembrook. “This is a research tool gathering information that is already in the public domain.”
Google must divulge YouTube user’s logs to Viacom
BBC
July 3, 2008
The ruling comes as part of Google’s legal battle with Viacom over allegations of copyright infringement.
Digital rights group the Electronic Frontier Foundation (EFF) called the ruling a “set-back to privacy rights”.
The viewing log, which will be handed to Viacom, contains the log-in ID of users, the computer IP address (online identifier) and video clip details.
While the legal battle between the two firms is being contested in the US, it is thought the ruling will apply to YouTube users and their viewing habits everywhere.
Viacom, which owns MTV and Paramount Pictures, has alleged that YouTube is guilty of massive copyright infringement.
The UK’s Premier League association is also seeking class action status with Viacom on the issue, alleging YouTube, which was bought by Google in 2006, has been used to watch football highlights.
http://www.bloomberg.com/apps/news?pid=..5S5DU&refer=home
Filed under: 1st amendment, Air Force, Britain, Canada, censorchip, Censorship, China, Dictatorship, egypt, Europe, european union, Fascism, France, free speech, google, Internet 2, internet blackout, Internet Filtering, internet police, Iran, kentucky, Saudi Arabia, Syria, thailand, United Kingdom, US Constitution
Governments step up blogger arrests
Jonathan M. Gitlin
Ars Technica
June 17, 2008
No matter what you think of blogging, Internet-based citizen journalism is a real threat, not just to traditional media business models but to totalitarian governments. How do we know that bloggers are drawing blood? Because some governments are hitting back harder and harder; last year saw a tripling in the number of bloggers arrested around the world compared to 2006, according to a report from the University of Washington.
“Last year, 2007, was a record year for blogger arrests, with three times as many as in 2006. Egypt, Iran and China are the most dangerous places to blog about political life, accounting for more than half of all arrests since blogging became big,” said Assistant Professor Phil Howard, lead author of the World Information Access Report. Howard also suggests that the real number of arrests may be much higher, as not every arrest makes it into the media.
The report separates the reason for arrests into six categories: violation of cultural norms, blogging involved with social protest, blogging about public policy, blogging about political figures, exposing corruption or human rights violations, and finally “other.” In addition to Iran, Egypt and China, Middle Eastern regimes in Syria and Saudi Arabia, and South East Asian nations such as Singapore, Malaysia, and Thailand also figure in the report. 2007 saw 36 bloggers arrested around the world, and since 2003 at least 64 have been arrested, with a total of 940 months of prison time served.
Even liberal democracies are not immune; France, Canada, the USA, and UK have all arrested people following their blogging activity since 2004. However, some of these cases might not seem so egregious; last year a blogger was arrested in Los Angeles following his postings about his attraction to young girls, and the beginning of 2008 saw an arrest in the UK after one Gavin Best used his blog to threaten a police officer’s family following his arrest for a large number of thefts.
Another troubling trend has been the complicity of western Internet firms such as Yahoo and Google, both of whom have handed over details of bloggers to the Chinese government, despite publicly condemning such policies.
http://www.huffingtonpost.com/greg..magazine_b_108073.html
Kentucky Settles Internet Censorship Suit, Agrees to Lift Ban on Blogs
http://www.citizen.org/pressroom/release.cfm?ID=2676
France To Ban Illegal Downloaders From Internet
http://technology.timesonline.co.uk/tol/news/tech_and_web/article4165519.ece
EU Says China Internet Control Unacceptable
http://www.breitbart.com/article..o6d&show_article=1
Air Force Spreads Cyber Command to All 50 States
http://blog.wired.com/defense/2008/06/air-forces-50-s.htmlmore
Death of the Internet! Long Live Internet 2!
http://www.nytimes.com/2008/06/15/technology/15cable.html?_r=1&oref=slogin
Filed under: 1984, 4th amendment, Big Brother, christopher dodd, google, Police State, Senate, Spy, Surveillance, US Constitution
Bill Requires All Digital Transactions Reported to Government
Senate Housing Bill Requires eBay, Amazon, Google, and All Credit Card Companies to Report Transactions to the Government
Freedom Works
June 20, 2008
Washington, DC – Hidden deep in Senator Christopher Dodd’s 630-page Senate housing legislation is a sweeping provision that affects the privacy and operation of nearly all of America’s small businesses. The provision, which was added by the bill’s managers without debate this week, would require the nation’s payment systems to track, aggregate, and report information on nearly every electronic transaction to the federal government.
http://www.badcopnews.com/2008/06/19/big-brother-conne..ale-and-credit-car/
Filed under: 1984, Airport Security, airstrikes, al-qaeda, atlantic, bernanke, Big Brother, bilderberg, biometrics, Bohemian Grove, Britain, Canada, cashless society, China, Cold War, Condoleezza Rice, Control Grid, Coup, Czech Republic, Dissent, eric schmidt, Europe, european union, False Flag, Federal Reserve, Fox News, gas prices, GE, George Bush, Germany, global elite, global government, Globalism, google, Henry Kissinger, International Bankers, internationalists, Iran, jim tucker, JP Morgan, Media, Media Fear, Mexico, microchip, Military Industrial Complex, military strike, NATO, neocons, New World Order, Nuke, Oil, Petrol, poland, Police State, Preemptive Strike, preemptive war, Protest, RFID, Robert Gates, Russia, secret meetings, Secret Societies, Shock and Awe, spain, Surveillance, Tehran, United Kingdom, Verichip, virginia, War On Terror, World Bank, WW3, ww4 | Tags: Karel Schwarzenberg, pfizer, Vernon Jordan, Yuri Baluyevsky
Secret Bilderberg Agenda To Microchip Americans Leaked
Elitists want to microchip Americans in name of fighting terrorism, Europeans universally opposed to attack on Iran, Globalists fear oil prices rising too quickly
Paul Joseph Watson
Prison Planet
June 10, 2008
Sources from inside the 2008 Bilderberg meeting have leaked the details of what elitists were discussing in Chantilly Virginia last week and the talking points were ominous – a plan to microchip Americans under the pretext of fighting terrorist groups which will be identified as blonde haired, blue eyed westerners.
Veteran Bilderberg sleuth Jim Tucker relies on sources who regularly attend Bilderberg as aides and assistants but who are not Bilderberg members themselves. The information they provided this year is bone-chilling for those who have tracked the development of the plan to make the general public consider implanted microchips as a convenience as routine as credit cards.
“Under the heading of resisting terrorism there were points made about how the terrorist organizations are recruiting people who do not look like terrorists – blonde, blue eyed boys – they’re searching hard for those types to become the new mad bombers,” said Tucker
As we have documented, the blue eyed blonde haired Al-Qaeda line is a familiar talking point that has been pushed on Fox News and within other Neo-Con circles in an attempt to turn the anti-terror apparatus around to target dissidents, protesters and the American people in general.
Ominously, Tucker’s source also told him that Bilderberg were discussing the microchipping of humans on a mass scale, which would be introduced under the pretext of fighting terrorism whereby the “good guys” would be allowed to travel freely from airports so long as their microchip could be scanned and the information stored in a database.
Tucker said the idea was also sold on the basis that it would help hospital staff treat a patient in an emergency situation because a scan of the chip would provide instantaneous access to health details.
Tucker underscored that Bilderberg were talking about subdermally implanted chips and not merely RFID chips contained in clothing. The discussion took place in a main conference hall and was part of the agenda, not an off-hand remark in the hotel bar.
Such a bizarre concept may seem unbelievable to some, but over the last ten years there have been dozens of examples of people accepting implanted chips for a variety of different reasons.
In 2004, Mexico’s attorney general and 160 of his office staff were implanted with tracker chips to control access to to secure areas of their headquarters.
The Baja Beach Club in Barcelona and other nightclubs around the world are already offering implantable chips to customers who want to pay for drinks with the wave of a hand and also get access to VIP areas of the club lounge.
Bilderberg skeptical of attack on Iran
Tucker’s source told him that Secretary of Defense Robert Gates did attend Bilderberg despite him not appearing on the official list.
Tucker said that his sources told him Gates was in attendance to present his case for war with Iran, but that the majority of Bilderberg members were against an attack at this time.
“The Europeans were generally opposed to an invasion of Iran – Gates made the regular war propaganda drill about how Iran is a nuclear threat to everybody,” said Tucker, adding that European Bilderbergers made snide comments about where such nuclear weapons actually were being kept and at one point joking that they were possibly “in Saddam Hussein’s tomb”.
Despite Bilderberg opposition, Tucker said that the administration was still considering an attack before Bush leaves office in January.
“At least 90 per cent of the Europeans oppose a war, probably closer to 100 per cent,” said Tucker, adding, “most of the Americans were passive and deferential to the Secretary of Defense and Condoleezza Rice’s pitch in so far as Iran is concerned”.
Tucker said that most Americans present at the meeting were opposed to attacking Iran but dare not be as visible and loud in their opposition as the Europeans.
Energy and oil prices
“One of the Bilderberg boys raised this question – should we put a lid on the rise in oil prices, are we reaching the point of diminishing returns,” said Tucker, adding that Bilderberg noted how Americans were trading in their SUV’s in record numbers for small and more fuel efficient cars and using more public transport to combat high gas prices.
Tucker’s source said that Bilderberg were predicting $5 for a gallon of gas by the end of this summer and oil over $150 dollars a barrel, but that this was a ceiling and oil prices would probably begin to decline thereafter because they thought the acceleration had happened too quickly.
As we previously reported, Bilderberg called for oil prices to soar in 2005 when oil was a mere $40 a barrel.
During the conference in Germany, Henry Kissinger told his fellow attendees that the elite had resolved to ensure that oil prices would double over the course of the next 12-24 months, which is exactly what happened.
During their 2006 meeting in Ottawa Canada, Bilderberg agreed to push for $105 a barrel before the end of 2008. With that target having been smashed months ago, the acceleration towards $150 is outstripping even Bilderberg’s goal, which is why the elitists expressed a desire to cool prices at least in the short term.
Just two days after he left Bilderberg, Fed Chairman Ben Bernanke, George W. Bush and others expressed support for a strong dollar and Bernanke hinted that interest rates could rise, which immediately caused oil prices to drop in line with Bilderberg’s consensus.
Rice Formalized Missile Defense Policy At BilderbergSecretary of State discussed radar treaty with Czech Foreign Minister
Paul Joseph Watson
Prison Planet
June 12, 2008
U.S. Secretary of State Condoleezza Rice moved the U.S. missile defense shield agenda a step forward during her attendance at the Bilderberg meeting last week, during which she formalized plans to sign a treaty on installing a U.S. radar base in the Czech Republic with Czech Foreign Minister Karel Schwarzenberg.
The news underscores the fact that important policy decisions are advanced at Bilderberg and that the event is not an insignificant talking shop, as debunkers often claim.
Reports out of both Czech newspapers and Chinese sources confirm that Rice formalized the policy at Bilderberg.
“U.S. Secretary of State of Condoleezza Rice has confirmed she will fly to Prague in early July to sign two U.S.- Czech treaties on the installation of a radar base on the Czech soil, the Czech daily Pravo said Tuesday,” reports Xinhua.
“According to the paper, Rice confirmed her plan to Schwarzenberg at the Bilderberg conference in Chantilly, Virginia, last week.”
“Bilderberg Club, also called the “Group of the Powerful,” is an informal invitation-only organization of politicians, representatives of the military and industrial complex, bankers and businessmen. Schwarzenberg was the only Czech participant in this year’s forum,” according to the report.
The prospect of the radar base, along with the planned installation of an interceptor missile base in Poland, has infuriated the Russians who believe the program is aimed at countering the Kremlin as well as Chinese military dominance, and not as a means of defending against Iranian nuclear ambitions as the U.S. claims.
In response to U.S. aggression, Russia has resumed long-range bomber patrols over the Atlantic which were mothballed at the end of the Cold War. NATO warplanes have intercepted Russian Bear Bombers on numerous occasions.
In February, Russia’s military chief of staff General Yuri Baluyevsky (pictured left) threatened to use nuclear weapons to defend Russia should an attack on Iran put the Kremlin in the line of fire.
In November last year, Baluyevsky dubbed America “evil” while cautioning that the “insidious” U.S. missile defense shield weapons system has nothing to do with countering Iran and is aimed squarely at Moscow.
“If the Americans deploy the radar by 2011 and anti-ballistic missiles by 2012-2013, they will certainly be directed against Russia, and we can easily prove it,” Baluyevsky told Russia Today.
“Today, there is no need to be afraid of the Russian Armed Forces. However, I do not believe that the Russian military is obliged to defend the world from the evil Americans,” he added.
Washington Post Mentions Bilderberg & Bohemian Grove
Washington Post
June 13, 2008
It was a quintessentially Washington moment:
There, in the Ritz-Carlton ballroom Monday, stood Vernon Jordan — the political insider, corporate networker and financial rainmaker, tall and impeccably turned out — presiding over his last meeting as head of the Economic Club of Washington.
During his four-year tenure, Jordan had used his incomparable connections to bring the heads of J.P. Morgan Chase, Kohlberg Kravis Roberts, American Express, Pfizer and General Electric, along with the secretary of the Treasury, the chairman of the Federal Reserve and the president of the United States, to speak to 400 of the city’s top business executives.
Now, for his final act, Jordan had reached beyond the Old Economy establishment and snared the chief executive of Google, the hottest company on the planet. Jordan had met Eric Schmidt the year before at Bilderberg, the super-secret gathering that falls between Davos and Bohemian Grove on the calendars of the global elite. By the end of that three-day meeting in Istanbul, Jordan had snared his final speaker.
Depending on your point of view, Jordan represents everything that is right or wrong with Washington.
To the cynical and conspiratorial, Jordan epitomizes the clubby and back-scratching Washington power broker, an amoral fixer who uses his web of connections to enrich himself and his clients while corrupting the political process.
http://www.prisonplanet.com/articles/june2008/061008_iran_threatened.htm
Kaine, elected leaders and the mystery of Bilderberg
http://www.loudountimes.com/blogs/..rs-and-mystery-bilderberg/
Bilderberg Seeks Bank Centralization Agenda
http://www.roguegovernment.com/news.php?id=9845
Canadian Powerbrokers at Bilderberg
http://www.embassymag.ca/html/index..8/june/11/chatterhouse/
Filed under: 1984, 4th amendment, ACLU, army, Big Brother, bill of rights, Britain, CCTV, Censorship, civil liberties, civil rights, Condoleezza Rice, Coup, DHS, Europe, False Flag, FBI, FOIA, George Bush, google, Hegelian Dialectic, Hillary Clinton, Homeland Security, Internet 2, Iraq, manhattan project, michael chertoff, microchip, Military, nation building, Nuke, occupation, Oppression, Police State, Problem Reaction Solution, Propaganda, Saddam Hussein, spy satellite, Surveillance, United Kingdom, US Constitution, verison, warrantless wiretap, Washington D.C., WMD | Tags: EFF, electronic frontier foundation
FBI Spies On IMs E-Mails And Cell Phones
John Bryne
Raw Story
April 8, 2008
FBI also spies on home soil for military, documents show; Much information acquired without court order
The Federal Bureau of Investigation has been routinely monitoring the e-mails, instant messages and cell phone calls of suspects across the United States — and has done so, in many cases, without the approval of a court.
Documents released under the Freedom of Information Act and given to the Washington Post — which stuck the story on page three — show that the FBI’s massive dragnet, connected to the backends of telecommunications carriers, “allows authorized FBI agents and analysts, with point-and-click ease, to receive e-mails, instant messages, cellphone calls and other communications that tell them not only what a suspect is saying, but where he is and where he has been, depending on the wording of a court order or a government directive,” the Post says.
But agents don’t need a court order to track to track the senders and recipients names, or how long calls or email exchanges lasted. These can be obtained simply by showing it’s “relevant” to a probe.
RAW STORY has placed a request to the Electronic Frontier Foundation for the new documents, and will post them upon receipt.
Some transactional data is obtained using National Security Letters. The Justice Department says use of these letters has risen from 8,500 in 2000 to 47,000 in 2005, according to the Post.
Last week, the American Civil Liberties Union released letters showing that the Pentagon is using the FBI to skirt legal restrictions on domestic surveillance.
Documents show the FBI has obtained the private records of Americans’ Internet service providers, financial institutions and telephone companies, for the military, according to more than 1,000 Pentagon documents reviewed by the ACLU — also using National Security Letters, without a court order.
The new revelations show definitively that telecommunications companies can transfer “with the click of a mouse, instantly transfer key data along a computer circuit to an FBI technology office in Quantico” upon request.
A telecom whistleblower, in an affidavit, has said he help maintain a high-speed DS-3 digital line referred to in house as the “Quantico circuit,” which allowed an outside organization “unfettered” access to the the carrier’s wireless network.
The network he’s speaking of? Verizon.
Verizon denies the allegations vaguely, saying “no government agency has open access to the company’s networks through electronic circuits.”
The Justice Department downplayed the new documents.
A spokesman told the Post that the US is asking only for “information at the beginning and end of a communication, and for information “reasonably available” by the network.
The FBI’s budget for says the collection system increased from $30 million in 2007 to $40 million in 2008, the paper said.
Homeland Security invokes nuclear bomb, as Bush quietly links cybersecurity program to NSA
John Byrne
Raw Story
April 9, 2008
Department of Homeland Security Michael Chertoff has dropped the bomb.
At a speech to hundreds of security professionals Wednesday, Chertoff declared that the federal government has created a cyber security “Mahattan Project,” referencing the 1941-1946 project led by the Army Corps of Engineers to develop American’s first atomic bomb.
According to Wired’s Ryan Singel, Chertoff gave few details of what the government actually plans to do.
He cites a little-noticed presidential order: “In January, President Bush signed a presidential order expanding the role of DHS and the NSA in government computer security,” Singel writes. “Its contents are classified, but the U.S. Director of National Intelligence has said he wants the NSA to monitor America’s internet traffic and Google searches for signs of cyber attack.“
The National Security Agency was the key player in President Bush’s warrantless wiretapping program, which was revealed by the New York Times in 2005.
Sound familiar? Yesterday, documents acquired by the Electronic Frontier Foundation under the Freedom of Information act showed the FBI has engaged in a massive cyber surveillance project that targets terror suspects emails, telephone calls and instant messages — and is able to get some information without a court order.
Last week, the ACLU revealed documents showing that the Pentagon was using the FBI to spy on Americans. The military is using the FBI to skirt legal restrictions on domestic surveillance to obtain private records of Americans’ Internet service providers, financial institutions and telephone companies, according to Pentagon documents.
Chertoff sought to calm those who worry that Homeland Security will begin to take an invasive Internet role.
“We don’t have to sit on the internet and prevent things from coming in or going out,” Chertoff said, which Singel says refers to China and other countries that censor what web sites their citizens can see. “That’s not what we are going to do.”
Bush wants $42 million more for program
But Chertoff may have had another reason for hyping threats of cyber terrorism. Money.
Congress appropriated $150 million in funding for the program this year, Singel notes. The administration has sought $192 million for 2009.
Speaking of threats, Chertoff remarked: “Imagine, if you will, a sophisticated attack on our financial systems that caused them to be paralyzed. It would shake the foundation of trust on which our financial system works.”
Remarked Singel wryly, “That digital mushroom cloud scenario means the government’s role in computer security must extend beyond federal networks, and reach to shared responsibility for financial, telecommunication and transportation infrastructure, Chertoff said. “The failure of any single system has cascading effects across our country.”
Which recalls another quote by a senior administration official.
Speaking of the alleged threat of Saddam Hussein in 2003, then National Security Adviser Condoleezza Rice remarked, “We don’t want the smoking gun to be a mushroom cloud.”
http://blog.wired.com/27bstroke6/2008/04/zombie-computer.html
Cyber Security Efforts Like Manhattan Project
http://www.ajc.com/business/content/..ebsecurity_0408.html
New Documents Detail FBI Eavesdropping On Americans’ Emails, IMs and Phone Calls
http://infowars.net/articles/april2008/080408FBI.htm
DHS Wants to Install Permanent Checkpoint in Vermont
http://www.wcax.com/global/story.asp?s=8117897
Hillary Supports Expanded Police State
http://www.latimes.com/news/politics/l..r12,0,2210184,print.story
3-Years For Laser Pointer Assault On Helicopter
http://www.foxnews.com/story/0,2933,347932,00.html
Anti-Terror Laws Used To Spy On Family
http://www.independent.co.uk/n..sed-to-spy-on-family-807873.html
100 Officers Raid Car Show To Give Tickets
http://www.thenewspaper.com/news/23/2302.asp
D.C. police set to monitor 5,000 cameras
http://www.washingtontimes.c..9/METRO/769331158/1004
CCTV could be used in exam rooms
http://news.bbc.co.uk/1/hi/education/7342432.stm
Police officers to be microchipped
http://www.dailymail.co.uk/pag..article_id=558597&in_page_id=1770
Filed under: 1984, 4th amendment, 9/11, Big Brother, Control Grid, DHS, Drivers License, FBI, FEMA, google, Homeland Security, Martial Law, michael chertoff, Military, NAO, NORTHCOM, NSA, Pentagon, Police State, spy satellite, Surveillance, Troops, US Constitution, War On Terror | Tags: fuision centers
DHS reckons US cops’ access to sat-surveillance is go
Lewis Page
The Register
April 3, 2008
US Homeland Security overlord Michael Chertoff has told reporters that he believes plans for increased use of satellite surveillance by American law-enforcement agencies are ready to move forward. However, Democratic politicians remain unconvinced that adequate privacy and civil liberties safeguards are in place.
“I think the way is now clear to stand NAO up and go warm,” said Chertoff, briefing journalists about the proposed National Applications Office.
NAO would allow US police, immigration, drug-enforcement and other officials to have access to data from various US satellites passing above America. It is understood that the information would be supplied mostly by spacecraft which at the moment are used for meteorological and geological surveying, or other scientific tasks. Satellites of this type can often deliver high-resolution images which would also be useful to law enforcement.
Purpose-built US surveillance satellites operated on behalf of military and intelligence agencies also pass above the US frequently. However, even the location of such spacecraft is often deemed to be a secret – for all that it may be well-known to amateur skywatchers. The capabilities of the true spybirds are even more jealously guarded, but realistically this information would soon become common knowledge if ordinary coppers were able to get such imagery.
Therefore, the new NAO probably won’t offer very wide access – if any – to America’s proper sky-spies. But it could provide a wealth of information all the same, and some US legislators are concerned about the implications.
Chertoff pooh-poohed such worries, saying that detailed assessments had been done and that Congresspersons had been briefed. The DHS chief believed that there’s a “good process in place to make sure there aren’t any… transgressions”. The DHS has also pointed out that various feds including the Secret Service* and FBI have used satellite imagery of the US in various previous investigations on a case-by-case basis.
Even so, plans for warm erection of the NAO could face a bumpy ride from Democrat-dominated committees on Capitol Hill.
State “Fusion Centers” And Pentagon-Run FBI Programs Spy On Americans
Steve Watson
Infowars.net
April 2, 2008
Fresh revelations of state and Pentagon run terrorist surveillance programs that “skirt legal restrictions” serve to remind the American public that they are now the prime suspects in the post 9/11 panopticon society.
Separate documents obtained by the ACLU and the Washington Post have created similar headlines on the same day about two new freedom eroding processes that have been in full swing for some time.
“Fusion Centers”
Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cellphone numbers, insurance claims, driver’s license photographs and credit reports, according to the Washington Post.
Dozens of the organizations known as fusion centers were created after the Sept. 11, 2001, terrorist attacks to identify potential threats and improve the way information is shared. The centers use law enforcement analysts and sophisticated computer systems to compile, or fuse, disparate tips and clues and pass along the refined information to other agencies.
The centers received $254 million from the Department of Homeland Security between 2004 and 2007 and also work in conjunction with the military arm of the DHS, NORTHCOM.
http://rawstory.com/news/2008/CIA_creates_miniGoogle_0331.html
Filed under: 1984, Big Brother, biometrics, google, microchip, Microsoft, Minority Report, RFID, Surveillance, warrantless wiretap | Tags: comcast, Gerard Kunkel, Minority Report, TiVo
Comcast denies developing cameras in cable boxes
Paul Joseph Watson
Prison Planet
March 25, 2008
Comcast has denied that it is developing camera devices built in to cable boxes that monitor consumers as they enter the room, despite the fact that Vice-President Gerard Kunkel admitted to a journalist that such a move would represent a “holy grail,” and rival companies like TiVo and Microsoft have already filed patents for similar technology.
A firestorm of controversy erupted last week after industry website newteevee.com carried an article by Chris Albrecht which revealed that Comcast was, “experimenting with different camera technologies built into devices so it can know who’s in your living room”.
How did Albrecht know? Because Comcast’s senior VP of user experience Gerard Kunkel told him during the Digital Living Room conference held in San Francisco.
“Perhaps I’ve seen Enemy of the State too many times, or perhaps I’m just naive about the depths to which Comcast currently tracks my every move,” wrote Albrecht.
“The idea being that if you turn on your cable box, it recognizes you and pulls up shows already in your profile or makes recommendations. If parents are watching TV with their children, for example, parental controls could appear to block certain content from appearing on the screen. Kunkel also said this type of monitoring is the “holy grail” because it could help serve up specifically tailored ads. Yikes.”
Readers responded to the article in droves and most were shocked by the proposals.
“Orwell thought that cameras in the living room would imposed on us by a fascist government. Fascism these days is dominated by corporate power guised under a mantle of legitimacy. These systems of control have been primarily put in place by willful consumption of consumer goods,” wrote one.
“This is not cool, this is not fun, this is not exciting. This is invasive. They’ve been talking about this technology since the inception of cable modems, and there’s a certain amount of tracking in place already. Cameras? Too much,” stated another.
Comcast responded to the article by claiming the device was, “in no way designed to – or capable of – monitoring your living room. These technologies are designed to allow simple navigation on a television set just as the Wii remote uses a camera to manage its much heralded gesture-based interactivity.”
However, Albrecht shot back by pointing out that Kunkel told him the device was explicitly being designed so as to monitor who was entering the living room.
“After you granted me our initial video interview, you brought up the topic of Comcast knowing who was in the living room in a conversation between you, myself and another conference attendee,” writes Albrecht.
“I actually left and came back to follow up on this point while you were talking with that same attendee. At this point, you were aware that I was a reporter and I took handwritten notes in front of you as we talked to make sure I had an accurate accounting of what you were saying,” he added.
Tracking and databasing of consumer’s TV viewing habits is nothing new – for years cable box companies like TiVo have monitored behavior down to the level of what parts of shows viewers rewind or fast forward – an example being Janet Jackson’s wardrobe malfunction during the 2003 Super Bowl half-time show.
Indeed, the monitoring of viewers for the purposes of Minority Report style commercial assaults and viewer customization has been in the works since at least early 2005.
In November 2005, TiVo applied for a patent allowing customization of TV remotes and viewing preferences via an RFID chip the consumer would attach to his or her body – which is just one step away from an embedded microchip in the body.
Microsoft has also applied for a patent that would utilize, “a camera sitting on top of a television set to detect the presence of viewers and identifying them using facial-recognition software — or perhaps a fingerprint scanner in a remote control,” according to a report from Multichannel News.
Similarly, corporations and eventually the government is planning to use microphones in the computers of an estimated 150 million-plus Internet active Americans to spy on their lifestyle choices and build psychological profiles which will be used for surveillance, invasive advertising and data mining.
In 2006, Google announced that they were developing a plan to use in-built microphones to listen in on user’s background noise, be it television, music or radio – and then direct advertising at them based on their preferences.
“The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject,” reported the Register.
Last year the New York Times reported on a venture by Pudding Media, a new company founded by two former Israeli intelligence officers, to offer its customers free Internet phone service in return for their consent to have their conversations monitored for keywords upon which targeted advertising is directed.
“A conversation about movies, for example, will elicit movie reviews and ads for new films that the caller will see during the conversation. Pudding Media is working on a way to e-mail the ads and other content to the person on the other end of the call, or to show it on that person’s cellphone screen,” according to the report.
If you think telesales calls and pop-ups ads are annoying, the new wave of invasive advertising will not only saturate the senses with 24/7 vapid consumerism, but it will signal the death knell for the assumption that privacy is a human right not to be infringed upon by corporations or the state.
Orwell’s telescreens and Minority Report style assaults on our senses may not be born out of government coercion, but as a result of consumers willfully enslaving themselves into this matrix – all for the convenience of enhancing their consumption of programming via the one-eyed brainwashing monster in the corner of the room.
Filed under: Big Brother, biometrics, CIA, Control Grid, Dick Cheney, DNA Database, google, Police State, Surveillance
The Truth About Google’s Privacy
http://youtube.com/watch?v=uN-t5wyp2PQ
Google Funds Web-DNA Test
http://www.reuters.com/article/techn..=technologyNews&rpc=22&sp=true
Cheney Wants Surveillance Law Expanded
http://ap.google.com/article/ALeqM…klcJJApcAD8UBNQBO2
Biometrics Used To Identify Terrorists
http://www.news.com.au/story/0,23599,23087674-2,00.html
Limits to the Stability of a Scientific World Empire
http://www.knowledgedr..80121_ISS_2_Stability.htm
Filed under: Benazir Bhutto, Big Banks, Britain, central bank, China, Chrysler, credit card, Credit Crisis, DEBT, ECB, Economic Collapse, economic depression, Economy, Euro, Europe, european central bank, FBI, Federal Reserve, gas prices, gold, gold confiscation, google, Great Depression, Greenback, housing market, Inflation, interest rate cuts, Iraq, liberty dollar, Oil, Pakistan, Petrol, pound, rate cut, Rawalpindi, Saudi Arabia, Stock Market, subprime, subprime lending, United Kingdom, US Economy
Gold rises above $830 over Pakistan
The Times
December 28, 2007
Gold put in a stellar performance again after fears of political instability in Pakistan in the wake of the assassination of opposition leader Benazir Bhutto sparked a flight to safety.
Gold has traditionally performed well in times of uncertainty and has maintained its reputation as a safe-haven investment despite recent price volatility.
The precious yellow metal was trading $11.47 firmer at $836.77 at 17:35 after safe-haven buying triggered a new test of previous multi-decade highs.
Spot prices had been languishing well below the US$830 an ounce mark when they were jolted from a month-long slumber yesterday afternoon as news of Bhutto’s death aroused concerns over heightened geopolitical tension.
The metal climbed to US$830.50 on the news but a brief round of profit taking saw it finish slightly easier yesterday at $827.50.
Bhutto died when an attacker shot her and then blew himself up as she left a political rally in Rawalpindi, a city near the capital where Pakistan’s army has its headquarters.
It was the second suicide attack against her since her tumultuous homecoming from an eight-year exile in October.
Her assassination has sparked nationwide grief and fury, while unrest risks tipping the volatile country into chaos.
Bhutto was buried earlier today and along with her the promise of restoring democracy in Pakistan.
“For the moment resistance at the $830 level appears to be capping gold, however with the dollar under pressure and violent protests seen in Pakistan it is likely that gold could see further safe-haven investment demand, and potentially rise to challenge this years high around $845.60,” said James Moore of TheBullionDesk.
With political tensions providing the environment of uncertainty that gold enjoys, the momentum in gold prices remains to the upside for now.
Oil steady near $97 on lower US stocks, Bhutto
Reuters
December 28, 2007
Oil rose on Friday on U.S. supply concerns, the slumping dollar and mounting tensions in Pakistan and northern Iraq.
U.S. crude traded up 23 cents to $96.85 a barrel by 12:05 p.m. EST. London Brent gained 12 cents to $94.90 a barrel.
A U.S. government report on Thursday showed unexpectedly large draws in crude and distillate inventories in the world’s top consumer. U.S. crude inventories are now at their lowest level in nearly three years, adding to winter supply worries that helped push oil to nearly $100 in November.
“Escalating geopolitical tensions, tightening oil supplies and a weakening dollar would seem to stack the deck in favor of further upward movement,” said Mike Fitzpatrick, vice president at MF Global.
The assassination of Pakistani opposition leader Benazir Bhutto on Thursday stoked geopolitical concerns, although Pakistan is not a major crude producer and unrest is unlikely to directly affect oil flows.
“The Bhutto story will keep being a factor into next week, and it should help keep a floor under the market, along with the other geopolitical uncertainties,” said a New York broker.
Forex – Dollar falls continue on weak US data; Euro at record high vs pound
Thompson Financial
December 28, 2007
The dollar fell across the board, coming under further pressure after a string of weak US data, while yet another disappointing report on the UK housing market pushed the euro to fresh record highs against the pound.
Yesterday’s unexpectedly weak US durable goods orders data added to fears about the state of the US economy and increased the likelihood that the Federal Reserve will need to cut interest rates further next year.
‘US economic data continues to disappoint the market with yesterday’s worse-than-expected durable goods orders for November adding further downside pressure to the greenback,’ said James Hughes, market analyst at CMC Markets.
The European Central Bank by contrast is not expected to temper its hawkish rhetoric any time soon, particularly with regional German inflation figures suggesting that the inflation pressures it warned of have not gone away.
The euro rose to a 15-day high against the dollar of 1.4682 usd, but it also staged fresh gains against the pound, hitting a new record high of 0.7350 stg.
Related News:
http://www.youtube.com/watch?v=4XhvG_fD0HA
Dollar Strategists Predict End of Bear Market in 2008
http://www.bloomberg.com/apps/news?pid=2…puc&refer=home
Wage Slavery For Elderly People
http://www.truthnews.us/?p=1411
Chrysler CEO: We Are Operationally Bankrupt
http://money.cnn.com/2007/12/2…stversion=2007122107
US braces for baby boom retirement wave
http://www.breitbart.com/article.p…5pv&show_article=1
Bank’s Face Financial Turmoil
http://news.yahoo.com/s/afp/200712…XWQKEAn6oLKKoOrgF
Credit Loss Could Hit $1 Trillion
http://www.theaustralian.news…22973589-643,00.html
Oil Rises On Inventory Shortfalls
http://biz.yahoo.com/ap/071227/oil_prices.html?.v=18
Growing Credit Card Debt In US Prompting Warnings Of Worse To Come
http://www.businessweek.com/ap/financialnews/D8TNB7E00.htm
October Home Prices Post Record Decline
http://biz.yahoo.com/rb/071226…mesindex.html?.v=7
No Trial, No Conviction: FBI Steals Millions of Dollars Worth of Gold
http://cryptogon.com/?p=1731
China’s New Oil World Order
http://www.bloomberg.com/apps/news?pid=2060….QO2SvA7w&refer=china
Denmark Bank predicts Ron Paul presidency and U.S. depression
http://www.usadaily.com/article.cfm?articleID=210132
Saudi Arabia fatwa against the dollar
http://blogs.telegraph.co.uk/busine..ber07/fatwa.htm
Goodbye to the $2 pound in 2008
Fed promises as much money as the banks want
Ethanol Blamed For Food Price Hikes
7 economic warning signs: Could a small shock push the economy over the edge?
Zimbabwe Woe As Banks Stay Shut
People & Power – Death of the dollar
Growing number of Americans expect recession: poll
Gold climbs above $800 in London as dollar drops; silver gains
Northern Rock Rescue Cost $100B
US Inflation Soars – Largest Rise in Producer Prices Since 1973!
US foreclosure filings up 68 pct in Nov.
U.S. Dollar’s Credibility Being `Stretched,’ UBS Economist Says
US Federal Reserve’s subprime regulations shield Wall Street banks
Economy teeters on brink, says Resler
GAO Says Government Failed Yet Another Financial Audit
One in Five Americans Must Borrow to Heat Homes This Winter
Morgan Stanley secures $5bn from China
CNN: Ron Paul Says U.S. Going Broke
ECB Offers Banks Unlimited Funds
Overstock.com CEO warns of depression
Filed under: 2008 Election, Air Force, boston, Boston Tea Party, CNN, coast guard, Department of Defense, DoD, google, GOP, Iowa, Jack Cafferty, Joe Scarborough, John McCain, Mike Huckabee, moneybomb, MSNBC, navy, Neolibs, New Hampshire, Republican Debate, Ron Paul, Troops, tucker carlson
Ron Paul’s “Money Bomb” Media Coverage
http://www.youtube.com/watch?v=KpVPtIvpsSc&feature=bzb302
Ron Paul on CNN American Morning
http://www.youtube.com/watch?v=KdSxLH1NfY0
Ron Paul on Morning Joe
http://www.youtube.com/watch?v=alxjl4IjZ9k
Tucker interviews Ron Paul’s campaign chairman
http://www.youtube.com/watch?v=jOoJ36HJ4Ik
Cafferty File On Ron Paul $6M Day
http://www.youtube.com/watch?v=nm1VlFSFPRs
Related News:
http://mparent7777-2.blogspot.com/…-contributors-google-us.html
Video: Ron Paul TV Special To Air In Iowa
http://www.roguegovernment.com/news.php?id=5549
Andrew Sullivan endorses Ron Paul over Mccain
http://andrewsullivan.theatlantic.com/th…n-paul-for-th.html
Google Tops Among Ron Paul Donors
http://www.webpronews.com/topnew…ong-ron-paul-donors
Non-News Highlighted Over Paul’s Historic Success
http://www.truthnews.us/?p=1310
Neo-Libs Label Record Breaking Ron Paul Money Bomb “Abject Failure”
http://www.prisonplanet.com/arti…cord_breaking.htm
More Hiring and Advertising Ahead for Paul Campaign as the Donations Pour In
http://www.nytimes.com/2007/1…953f5e2d&ei=5070&emc=eta1
Hedge Mogul To Buy Ron Paul Ads For NH
http://www.fmnn.com/WorldNews.asp?nid=52741
What Will Ron Paul Do With His Cash Haul?
http://www.huffingtonpost.co…l-will-do-wit_n_77167.html
Ron Paul Tosses Iraq War Barrel Overboard
http://www.youtube.com/watch?v=xkZ8rSyXuI4
Forbes Says Bloomberg to Spend Big Bucks to Derail Ron Paul
http://www.freemarketnews.com/WorldNews.asp?nid=52682
Paul emphasizes fundraising as sign of strength, longevity
http://desmoinesregister.com/…180387/1001/NEWS
Bookmakers Hit Mark With Ron Paul Money Bomb Bet
http://www.gambling911.com/Ron-Paul-121707.html
Mike Huckabee’s Online Supporters Copy Ron Paul’s
http://blog.wired.com/27bstroke6/2007/12/mike-huckabees.html
Rand Paul Worried Vote Stealing May Hinder Ron Paul Campaign
http://infowars.net/articles/december2007/171207Rand.htm
Huckabee spot reminds Paul of fascism prediction
Paul: Bush betrayed people’s trust
David Paul cheers on brother from Ottawa Co. home
Ron Paul Shatters Single-Day Primary Fundraising Record In Bid For White House
Filed under: 4th amendment, Big Brother, Control Grid, Dictatorship, DOJ, George Bush, google, Martial Law, NSA, Police State, Surveillance
Bush Gets 6 Months Big Brother Dictator Powers
6 month window gives government carte blanche to impose any surveillance policy and for it to remain legal in perpetuity
Paul Joseph Watson
Prison Planet
August 6, 2007
Not content with now being lawfully allowed to force ISP’s and cell phone companies to turn over data about customers without a warrant, the Bush administration is pushing for even more authority to spy on American citizens, and has already been handed a 6 month window within which to impose any surveillance policy it likes, and for that program to remain legal in perpetuity.
Legislation signed Sunday gives the government the green light to install permanent backdoors in communications systems that allow warrantless wiretapping of American citizens, a blatant violation of the 4th amendment.
The administration has a 6 month window in which to impose any surveillance program it chooses and that program will go unchallenged and remain legally binding in perpetuity – it cannot be revoked. Under the definitions of the legislation, Bush has been granted absolute dictator status for a minimum of 6 months, dovetailing with a recent Presidential Decision Directive that also appoints Bush as a supreme dictator during an announced emergency.
If he so chooses, and so long as it’s implemented within the next half year, Bush could build a database of every website visited by every American – and the policy would be immune from Congressional challenge even after the “surveillance gap” legislation reaches its sunset.
Since the Administration argues that the world’s communication networks now route many foreign to foreign calls and emails through switches in the United States, it would be open season on the privacy of millions of Americans.
But the administration is far from finished with its latest power grab, and is now pushing for liability for ISP’s and cell phone companies in order to head off court cases brought by the ACLU and others, including retroactive protection which would neutralize all attempts to challenge the administration’s wiretapping activities spanning back to 9/11.
“Prior to the law’s passage, the nation’s spy agencies, such as the National Security Agency and the Defense Intelligence Agency, didn’t need any court approval to spy on foreigners so long as the wiretaps were outside the United States,” writes Wired’s Ryan Singel.
“Now, those agencies are free to order services like Skype, cell phone companies and arguably even search engines to comply with secret spy orders to create back doors in domestic communication networks for the nation’s spooks.”
One of the likely jewels of any new surveillance outpost would be the collection of Google search term history, which is already openly being stored by the company with the agreement of anyone that signs up for a free Google account.
“In short, the law gives the Administration the power to order the nation’s communication service providers — which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks — to create permanent spying outposts for the federal government,” concludes Singel.
In a disturbingly ironic parallel, Zimbabwe’s Communist dictator Robert Mugabe also approved a law Saturday that granted his government sweeping powers to monitor all cell phone, land line and Internet communications.
Related News:
Bush Granted Orwellian Spying Powers
http://www.roguegovernment.com/news.php?id=3382
Bush Confirms He Will Seek More Dictatorial Power
http://infowars.net/articles/august2007/070807Power.htm
Senate Website Witholding Spy Law Roll Call
http://www.pressesc.com/new…g-spy-law-roll-call
Six Months Till Permanent Spying Architecture
Bush Signs Law to Widen Legal Reach for Wiretapping
House Approves Wiretap Measure
Exclusive: Bush Again Expands Dictatorial Power
Senate passes Bush-backed spy bill
Bush Signs Wiretap Bill
The Myth of ‘Executive Privilege’
Bush Abolishes Fourth Amendment
Court secretly struck down Bush spying: report
Cheney Says He Is A ‘Unique Creature,’ Refuses To Say He Is Part Of Executive Branch
A Push to Rewrite Wiretap Law
Democrats Scrambling to Expand Eavesdropping
Ex-VP Mondale Accuses Cheney of Power Grab
Bush Takes Over Federal Science
Will Bush cancel the 2008 election?
MSNBC: House OKs wider wiretap powers
Bush Likely to Prevent Aides’ Testimony
Bush’s Martial Law Plan Is So Shocking, Even Congress Can’t See It
Total Hypocrisy Of New Bush Executive Order
Keith Olbermann on the Executive Order
Congressman Denied Access To Federal Post-Terror Attack Plans
Bush To Congress We Can’t Be Charged
Bush Abolishes Fifth Amendment
Gonzales Helped Cover-Up Bush DUI
Exclusive: For Alberto Gonzales, a Decade of Scandals, with a Child Molestation Cover-Up to Boot
White House says spying broader than known: report
Bush Administration’s intelligence chief acknowledges ‘series’ of other ‘secret surveillance activities’
NSA Spying Part of Broader Effort
Bush Calls For Easier Wiretapping Rules
Leahy Issues Subpoena For Rove
Gonzales Contradicts Prior Statements, Confirms Existence Of Other Spying Programs
FBI Wants Its Own Stasi
Gonzales: I’m Sticking Around To Fix Problems
Rove blamed for Attorney firings in Gonzales hearing; Specter raises prospect of impeachment
Lawsuit Against Wiretaps Rejected
Non Executive Entity Cheney To Assert Executive Privilege
Government agency says Bush overreaches on executive privilege
Bush Won’t Supply Subpoenaed Documents
White House Stonewalling May Force Congress to Charge President with Criminal Offenses
Washington Democrat Adds Voice to Cheney Impeachment Drive
Dems Call White House Out on Subpoenas
Bush White House Refuses to Answer to Subpoenas
CAUGHT ON TAPE: Cheney Claims VP is ‘An Important Part’ Of Executive Branch
White House/Cheney Subpoenaed
Subpoenas will be issued if the White House does not comply
CNN: Cheney No Longer Part of the Executive Branch?
Cheney Backs Off Claim That He’s “Fourth Branch of Government”
Dodd Tells Crowd in Rochester Impeaching Cheney Won’t Help
Cheney and Bush Claim Dictator Powers
Cheney role as power broker in spotlight again
NBC: Has Dick Cheney Gone Too Far?
President Bush Claims He’s Exempt from Security Oversight too
Cheney Declares VP Not Part of Executive Branch
Cheney Exempted His Office From Executive Order Protecting Classified Information
ABC News: Cheney Power Grab: Says White House Rules Don’t Apply to Him
Cheney Blasted For Declaring Himself Autonomous
Cheney Defiant on Classified Material
Hitler 1938, Cheney 2007?
George Bush’s Power Grab: Authorizes Martial Law Provisions
Jerome Corsi on C-SPAN: Bush Dictator Powers
Bush Re-Authorizes Martial Law Provisions
Bush To Be Dictator In A Catastrophic Emergency
Bush Anoints Himself as the Insurer of Constitutional Government in Emergency
New presidential directive gives Bush dictatorial power
Ron Paul: U.S. Close to Dictatorship
Google And The Personalized Search — All’s Well.. Or Orwell
Scott Buresh
Post Chronicle
August 6, 2007
You go to Google and enter your search term. Big Brother, the totalitarian character from George Orwell’s novel 1984, watches with detached interest. You see, to Big Brother, you are only a number – but he’d like to know as much about you as he can. Knowing you allows Big Brother to do many things – both good and evil.
Alright, enough of the “Big Brother” comparison – it’s been done many times before (and done many times better). However, there is an important central point to be made about personalized search. Google is now (and has been for some time) collecting data on individual users, and they are assuming that users will trust them with this data to “Do No Evil,” as their famous slogan goes. Only time will tell whether the trust is well-placed, or if people are willing to trust search engines with this type of data at all.
The basic principle behind personalized search is simple. When you go to Google and type in a search query, Google stores the data. As you return to the engine, a profile of your search habits is built up over time. With this information, Google can understand more about your interests and serve up more relevant search results.
For instance, let’s say that you have shown an interest in the topic of sport fishing in your search queries, while your neighbor has shown an interest in musical instruments in his search queries. Over time, as these preferences are made clear to the engine, your personalized search results for the term “bass” will largely be comprised of results that cover the fish while your neighbor’s results for “bass” will be comprised of results that primarily cover the musical instrument.
At present, you need to have signed up for a Google service for your results to be personalized. Such services include Gmail, AdWords, Google Toolbar, and many others. By default, as long as you are signed in to one of these programs, your personal search data will be collected. The term “at present” is used because Google certainly could implement personalized search on any user of the engine, regardless of whether he or she has a Google account. Google already places a cookie, or unique identifier, on the machine of anyone who types in a search query on Google – it would not be hard for them to use that information, rather than the Google account, to collect individual user data and personalize results. It is quite possible that Google is testing the waters of personalized search with people who have opted in to one of its services, and will expand the system to all users if there is limited uproar or government intervention.
For search engine optimization firms, the major shift brought about by personalized search will be in how they report on Google ranking data to clients. When collecting this data, they will have to run from a “clean” machine – that is, one that has no Google programs or cookies on it. The baseline results that are reported to the client will essentially be a snapshot of what a search engine user would see if they had no Google software installed. The good news is that Google account holders who have shown an interest in certain products and services will likely have results more favorable to the client than the baseline results indicate since personalized search assures that their search histories will be reviewed and the results likely skewed toward the client’s industry. The bad news is that the search engine optimization firm will be hard-pressed to demonstrate this – not to mention that the results that the client using a Google program has on its own personal machines will almost certainly not match up with the results that the firm is reporting (although the client machines should have better results, for the same reasons cited above).
Some people find the practice of storing information for personalized search purposes disturbing; others find the end result to be useful (still others find themselves experiencing an odd combination of both reactions). In defense of the engines, it is not as if they are building a dossier on individuals – again, you are only a number to them. However, the potential for misuse of the data is fairly high.
There are many advertising firms out there already that go through the cookies on your machine to figure out which ads will have the best effect on you. If you’ve ever been on a website and seen a banner ad that is directly related to something you have been doing research on lately, it is most likely not a coincidence. The ad platform simply browsed through the cookies on your machine to find out what topic held your interest, and dropped in a related ad once it determined what that topic was. Search engines have been buying firms with this technology lately; notable recent purchases include that of DoubleClick by Google and aQuantive by Microsoft. There seems to be little doubt that your search history will be combined with existing ad-serving technology to deliver even more relevant ads. Whether this constitutes misuse seems to be debatable – some people seem to have no problem with it, while it makes many others fairly uneasy.
Privacy issues that arise from personalized search are also a big question. The EU recently announced that it is probing into how long Google stores user information (this probe was subsequently extended to include all search engines). AOL recently committed a serious blunder when it released search data from 500,000 of its users, and it was discovered that it was fairly easy to identify many people by the search terms that they use (anybody ever “ego surf” – that is, type your own name into a search engine to see what comes up? If so, you wouldn’t be hard to spot). In addition, since the IP address of the computer creating the query is also reportedly tracked, a court order forcing the engine and the ISP (Internet Service Provider) to provide specific search data on individuals is a distinct possibility – the technology required to deliver upon such a demand is already in use.
Unless the government intervenes, the question will probably be decided by personal preference. As it becomes more common knowledge that Google (and other engines) store this type of data to enable personalized search, many users will take measures to block its use.
Are the search engines that collect this data “Doing No Evil?” The answer, I believe, will depend on each individual’s definition of evil. In the meantime, don’t be surprised when you type in a search query, and the engine seems to be reading your mind. It isn’t, really – it’s merely parsing through your memories.