They’re not much happier about a revised version that aides to Sen. Jay Rockefeller, a West Virginia Democrat, have spent months drafting behind closed doors. CNET News has obtained a copy of the 55-page draft (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency.
The new version would allow the president to “declare a cybersecurity emergency” relating to “non-governmental” computer networks and do what’s necessary to respond to the threat. Other sections of the proposal include a federal certification program for “cybersecurity professionals,” and a requirement that certain computer systems and networks in the private sector be managed by people who have been awarded that license.
“I think the redraft, while improved, remains troubling due to its vagueness,” said Larry Clinton, president of the Internet Security Alliance, which counts representatives of Verizon, Verisign, Nortel, and Carnegie Mellon University on its board. “It is unclear what authority Sen. Rockefeller thinks is necessary over the private sector. Unless this is clarified, we cannot properly analyze, let alone support the bill.”
Representatives of other large Internet and telecommunications companies expressed concerns about the bill in a teleconference with Rockefeller’s aides this week, but were not immediately available for interviews on Thursday.
A spokesman for Rockefeller also declined to comment on the record Thursday, saying that many people were unavailable because of the summer recess. A Senate source familiar with the bill compared the president’s power to take control of portions of the Internet to what President Bush did when grounding all aircraft on Sept. 11, 2001. The source said that one primary concern was the electrical grid, and what would happen if it were attacked from a broadband connection.
Student Must Pay $675,000 in Downloading Case
August 6, 2009, 8:42 am
Filed under:
1984,
Big Brother,
copyright,
Dictatorship,
EFF,
Empire,
FCC,
internet,
internet police,
IP,
ISP,
Minneapolis,
myspace,
nanny state,
orwell,
Police State,
privacy rights,
RIAA,
Spy,
Surveillance | Tags:
Joel Tenenbaum
Student Must Pay $675,000 in Downloading Case
AP
July 31, 2009
A federal jury on Friday ordered a Boston University graduate student who admitted illegally downloading and sharing music online to pay $675,000 to four record labels.
Joel Tenenbaum, of Providence, R.I., admitted in court that he downloaded and distributed 30 songs. The only issue for the jury to decide was how much in damages to award the record labels.
Under federal law, the recording companies were entitled to $750 to $30,000 per infringement. But the law allows as much as $150,000 per track if the jury finds the infringements were willful. The maximum jurors could have awarded in Tenenbaum’s case was $4.5 million.
Jurors ordered Tenenbaum to pay $22,500 for each incident of copyright infringement, effectively finding that his actions were willful. The attorney for the 25-year-old student had asked the jury earlier Friday to “send a message” to the music industry by awarding only minimal damages.
Tenenbaum said he was thankful that the case wasn’t in the millions and contrasted the significance of his fine with the maximum.
“That to me sends a message of ‘We considered your side with some legitimacy,'” he said. “$4.5 million would have been, ‘We don’t buy it at all.'”
He added he will file for bankruptcy if the verdict stands.
Tenenbaum’s lawyer, Harvard Law School professor Charles Nesson, said the jury’s verdict was not fair. He said he plans to appeal the decision because he was not allowed to argue a case based on fair use.
The case is only the nation’s second music downloading case against an individual to go to trial.
Last month, a federal jury in Minneapolis ruled that Jammie Thomas-Rasset, 32, must pay $1.92 million, or $80,000 on each of 24 songs, after concluding she willfully violated the copyrights on those tunes.
The jury began deliberating the case Friday afternoon.
After Tenenbaum admitted Thursday he is liable for damages for 30 songs at issue in the case, U.S. District Judge Nancy Gertner ruled that the jury must consider only whether his copyright infringement was willful and how much in damages to award four recording labels that sued him over the illegal file-sharing.
In his closing statement Friday, Nesson repeatedly referred to Tenenbaum as a “kid” and asked the jury to award only a small amount to the recording companies. At one point, Nesson suggested the damages should be as little as 99 cents per song, roughly the same amount Tenenbaum would have to pay if he legally purchased the music online.
But Tim Reynolds, a lawyer for the recording labels, recounted Tenenbaum’s history of file-sharing from 1999 to 2007, describing him as “a hardcore, habitual, long-term infringer who knew what he was doing was wrong.” Tenenbaum admitted on the witness stand that he had downloaded and shared more than 800 songs.
Tenenbaum said he downloaded and shared hundreds of songs by Nirvana, Green Day, The Smashing Pumpkins and other artists. The recording industry focused on only 30 songs in the case.
The music industry has typically offered to settle such cases for about $5,000, though it has said that it stopped filing such lawsuits last August and is instead working with Internet service providers to fight the worst offenders. Cases already filed, however, are proceeding to trial.
Tenenbaum testified that he had lied in pretrial depositions when he said his two sisters, friends and others may have been responsible for downloading the songs to his computer.
Under questioning from his own lawyer, Tenenbaum said he now takes responsibility for the illegal swapping.
“I used the computer. I uploaded, I downloaded music … I did it,” Tenenbaum said.
Mother Owes $1.92 Million For Downloading Songs
RED ALERT: Total Takeover Of America Near Completion
June 30, 2009, 10:08 am
Filed under:
1st amendment,
2nd Amendment,
4th amendment,
ACLU,
Al Gore,
anti gun,
bailouts,
Barack Obama,
barbara boxer,
bernanke,
Big Banks,
cap-and-trade,
carbon dioxide,
carbon regulation,
Carbon Tax,
China,
climate bill,
Co2,
Congress,
Credit Crisis,
DEBT,
defense department,
DHS,
Dictatorship,
DoD,
Dollar,
eco-nazis,
Economic Collapse,
economic depression,
Economy,
Empire,
environmental taxation,
Fascism,
FBI,
Federal Reserve,
free speech,
global economy,
global government,
global tax,
Global Warming,
Great Depression,
Greenback,
Gun Control,
health and environment,
Hoax,
Homeland Security,
House,
hr 1207,
HR 1966,
hyperinflation,
Inflation,
internet police,
mao,
maurice strong,
nanny state,
Nazi,
New World Order,
NWO,
obama,
Oppression,
Pentagon,
Police State,
Ron Paul,
s.787,
Senate,
socialism,
sovereignty,
stasi,
Stock Market,
Taxpayers,
thought crime,
TSA,
US Constitution,
US Economy,
Wall Street,
War On Terror,
world government | Tags:
death of america,
Local Law Enforcement Hate Crimes Prevention Act,
Matthew Shepard Hate Crimes Prevention Act,
Megan Meier Cyberbullying Prevention Act
RED ALERT: The Total Takeover Of America Enters Its Final Phase

Paul Joseph Watson
Prison Planet.com
June 29, 2009
The wholesale looting of America and the transfer of wealth and power over to a private banking elite who are setting up a world government, along with the complete obliteration of any remaining freedom to protest, resist, or even speak out against this agenda, is now entering its final phase as numerous different pieces of the jigsaw puzzle fall into place and portray a clear picture of tyranny.
We are about to sound the death knell for the United States if every one of the following attacks on our liberty, free speech, sovereignty, and right to not be ruled over by an unelected banking dictatorship is not fiercely opposed and crushed.
RED ALERT 1
The passage of the “Climate Bill” by the House and its likely approval by the Senate represents the entrée for the complete and total subjugation of any freedoms we had left and the beginning of nightmare regulation and suffocating control over every aspect of our personal lives by millions of green stasi tasked with enforcing impossible to attain goals of 80% carbon dioxide reduction – all based on the manufactured threat of global warming.
This bill will also sink the economy and create a new great depression, effectively obliterating America’s first world status. It represents a transfer of power and wealth from both the U.S. government and the American taxpayer over to the system of world government and global regulation now being erected by means of the climate change hoax.
This is far worse than just a “new tax” as Republicans are complaining – this is the total takeover of the American economy by private banking interests through the carbon trading system.
As we have attempted to warn, the major beneficiaries of the climate bill will be the elitists who own the carbon trading systems that will be used to handle the ‘cap and trade’ program, namely Al Gore and Maurice Strong, two figures intimately involved with a long standing movement to use the theory of man made global warming as a mechanism for profit and social engineering.
We must rally now to lobby members of Congress who voted for the legislation and demand they change their vote before July 2nd. Failing that, we must demand that the Senate does not rubber stamp this nightmare legislation. Failing that, we must support and organize to craft more legislation based on the example of Arizona, who recently passed state Senate legislation refusing to comply with insane climate laws coming from the federal level.
RED ALERT 2
The seemingly endless economic “bailouts” represent the wholesale looting of the American taxpayer and the grand theft of trillions of dollars by private banking interests who refuse to even disclose where the money went.
Not satisfied with stealing tens of trillions, under the Obama administration’s new regulatory reform plan, the Federal Reserve is now trying to enrich itself with dictator powers that will give it complete control over the U.S. economy, handing them the authority to “regulate” and shut down any company whose activity it believes could threaten the economy and the markets.
We must rally now and lobby more members of Congress to support Ron Paul’s H.R. 1207 bill to audit the Federal Reserve and highlight the fact that Bernanke is spewing financial terrorism when he threatens an economic collapse should the Fed be opened up to scrutiny.
RED ALERT 3
Federal hate crimes legislation, which in reality would criminalize “thought crimes,” has cleared the House and now faces the Senate as S.909, the Matthew Shepard Hate Crimes Prevention Act (officially, the Local Law Enforcement Hate Crimes Prevention Act).
S.909 is a direct violation of the First Amendment. It allows the federal government to prosecute people involved in “hate speech” transmitted over television, radio, and the internet. The House version of the bill states:
“Whoever transmits in interstate or foreign commerce [radio, TV, internet] any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior, shall be fined under this title or imprisoned not more than two years, or both. (HR 1966, SEC 3, Sec. 881a)”
In other words, if a talk show host engages in “hostile” speech against a person or persons of the above mentioned federally protected group that talk show host will face federal prosecution and the prospect of a two year prison term.
The Megan Meier Cyberbullying Prevention Act would similarly criminalize free speech on the Internet if it can be deemed in any way to have been “harmful” to an individual. This represents the end of political blogging and free speech on the world wide web.
If both bills are not opposed and thrown out then the First Amendment will become nothing more than a relic of a bygone age.
RED ALERT 4
The Senate bill S.787, otherwise known as the Clean Water Restoration Act (CWRA), would replace language in the regulatory act currently using “navigable waters” with “waters of the United States.”
What this means is that “the government would essentially be able to regulate everything from standing water in floodplains to creeks that run behind business and residences,” according to an Environmental Leader report.
This represents a complete takeover of private land and waterways by the federal government, a total assault on private property rights and a complete federalization of America’s land and water.
“In a letter to Senate Environment and Public Works Chair Barbara Boxer and ranking member James Inhofe, the American Farm Bureau Federation said that the proposed law would “extend to all water — anywhere from farm ponds, to storm water retention basins, to roadside ditches, to desert washes, to streets and gutters, even to a puddle of rainwater,” stated the letter. “For the first time in the 36-year history of the act, activities that have no impact on actual rivers and lakes would be subject to full federal regulation.”
If this bill becomes law, it will empower the federal government to seize private property on a whim, using similar powers that Communist China employed during Chairman Mao’s “great leap forward,” where landowners had their property violently confiscated and stolen by the government.
If this bill passes the Senate, private property rights in the United States are effectively null and void and the federal government would legally have the power to bulldoze families from their homes as routinely happens in Communist China.
RED ALERT 5
Amongst the myriad of assaults on the Second Amendment rights of American citizens undertaken by the Obama administration during the course of its first year in office, the one that stands out as the most alarming is the attempt to ban people who appear on the terrorist watch list from buying guns.
But isn’t stopping terrorists from buying guns surely a sensible measure to take? The problem is that the terrorist watch list, sometimes called the no fly list, is not a list of likely terrorists, it is a sprawling database of of innocent people that contains the names of over one million Americans. This is a rise of 32% since 2007 alone.
Members of Congress, nuns, war heroes, reverends, the former assistant attorney general, toddlers and children, the ACLU administrator, people with difficult names and all American names like Robert Johnson and Gary Smith, have become caught in the vast tentacle of this list, documents the ACLU.
Moreover, once a person is included on the terrorist watch list it is virtually impossible to get off it.
The terrorist watch list is an ever-expanding tool with which to deny Americans basic rights as well as to strip them completely of the Fourth Amendment.
Now it is being used to prevent law-abiding citizens from purchasing firearms. Legislation sponsored by the The Government Accountability Office seeks to “close the gap” and prevent victims of the terrorist watch list from being able to purchase firearms.
This represents a new end run around the Second Amendment and a concerted effort on behalf of the federal government to classify millions of innocent Americans as potential terrorists, thus stripping them of their Constitutional right to own firearms.
This represents a new end run around the Second Amendment and a concerted effort on behalf of the federal government to classify millions of innocent Americans as potential terrorists, thus stripping them of their Constitutional right to own firearms.
RED ALERT 6
Our right to protest against any of the egregious assaults on the Constitution that are listed above is itself being removed by new law enforcement and Pentagon training manuals and guidelines that define protesting as domestic terrorism.
Current Department of Defense anti-terrorism training course material states that the exercise of First Amendment rights in the U.S. constitutes terrorist activity.
Over the last few years we have documented countless examples of security assessment reports from the likes of the Department of Defense, the Department of Homeland Security and the FBI, as well as police training manuals, which state that anti-war protesters, gun owners, veterans, Ron Paul supporters and those who merely cite the Constitution should be equated with extremists and domestic terrorists.
The fact that the government is now treating people who merely criticize its conduct as domestic terrorists is the clearest signal possible that the United States has entered a period in history similar to Germany in the early 1930’s and that it can only be a matter of time before the right “emergency” provides the justification for dissidents to be targeted for round-ups and mass imprisonment.
No one can claim now that this is merely a paranoid delusion – the government itself is training its law enforcement and military arms that protesters and people who use their First Amendment rights are domestic terrorists. The last time this happened was under King George shortly before the American Revolution.
ONE MINUTE TO MIDNIGHT
If we don’t stand up in unison and exercise our right to protest and free speech now more than ever before, while pointing out that the real terrorists are those who would seek to destroy the freedoms enshrined in the Bill of Rights, then we may find ourselves doing our protesting behind the barbed wires and the concrete blocks of an internment camp.
The hour is late, the clock stands at one minute to midnight, and the federal government, through all the examples documented above, is on the verge of implementing nothing less than a total environmental, financial and societal dictatorship and killing what once was the United States of America.
Almost identical programs of total enslavement are also being pushed through in almost every other major western country at the same time.
If we don’t stop obsessing about the minutia of life and actually concentrate on the imminent destruction of the very principles of our livelihoods, the bedrock freedoms that allow us to operate in relative comfort on a daily basis and be reasonably secure in our own homes, being able to pay our bills, put food on the table, earn money, and air our grievances when government threatens to impinge on those basic freedoms, then there will be nothing left but a rotten hollow carcass and a memory of what America once strived to be – land of the free, home of the brave – not land of the thief, home of the slave.
Mother Sued $80,000 For Every Illegally Downloaded Song
June 22, 2009, 5:38 am
Filed under:
1984,
Big Brother,
copyright,
Dictatorship,
EFF,
Empire,
FCC,
internet,
internet police,
IP,
ISP,
myspace,
nanny state,
orwell,
Police State,
privacy rights,
RIAA,
Spy,
Surveillance
Single-Mother Ordered To Pay $80,000 Per Illegally Downloaded Song
A woman in Minnesota has been ordered to pay $80,000 a song to record companies for illegally downloading tracks and violating copyright laws.
A federal jury ruled that Jammie Thomas-Rasset willfully violated the copyrights on 24 songs, and awarded record companies $1.92 million.
The single mother of four from Minnesota was found liable for using the Kazaa peer-to-peer file-sharing network to download the songs over the internet.
Thomas-Rasset, 32, had been convicted previously, in October 2007, and ordered to pay $220,000 in damages, but the judge who presided over that trial threw out the verdict and ordered a retrial after he misdirected the jury.
The Recording Industry Association of America (RIAA) and big music labels have sued thousands of people for downloading and sharing music illegally, with most agreeing to settlements of between $3,000 and $5,000.
Thomas-Rasset was the first among those being sued to refuse a settlement and instead took the case to court, turning her into the highest-profile digital pirate in America.
She sat glumly, chin in hand, as she heard the jury’s finding of wilful infringement, which increased the potential penalty. She raised her eyebrows in surprise when the jury’s penalty of $80,000 (£49,000) per song was read out.
Outside the courtroom, she called the $1.92 million figure “kind of ridiculous” but expressed resignation over the decision.
“There’s no way they’re ever going to get that,” she said. “I’m a mom, limited means, so I’m not going to worry about it now.”
Her lawyer, Kiwi Camara, said that he and his client had not decided whether to appeal or pursue the RIAA’s settlement overtures.
Cara Duckworth, for the RIAA, said that the industry remained willing to settle. She refused to name a figure, but acknowledged that Thomas-Rasset had been given the chance to settle for $3,000 to $5,000 earlier in the case. “Since day one we have been willing to settle this case and we remain willing to do so,” Ms Duckworth said.
In December, the RIAA said that it would stop suing people who download music illegally to concentrate instead on getting internet service providers to take action. The move away from litigation represented an important shift in strategy for the music industry group, which had filed lawsuits in the US against some 35,000 people for online music piracy since 2003.
The focus on ISPs penalising illegal file-sharers is one of the main proposals in the new Digital Britain report published this week.
In testimony, Thomas-Rasset denied she shared any songs. The self-described “huge music fan” raised the possibility for the first time in the long-running case that her children or ex-husband might have done it. The defence did not provide any evidence that any of them had shared the files.
The recording companies accused Thomas-Rasset of offering 1,700 songs on Kazaa as of February 2005, before the company became a legal music subscription service after a settlement with entertainment companies. The music industry tried to prove only 24 exemplary infringements.
The court heard that Thomas-Rasset made the songs available on Kazaa under the screen name “tereastarr” – the same nickname that she acknowledged having used for years for her e-mail and several other computer accounts, including her MySpace page.
MediaSentry, the copyright security company, traced the files offered by “tereastarr” on Kazaa to Thomas-Rasset’s IP address and to her modem.
The recording industry has blamed online piracy for declines in music sales claiming it has lost billions of dollars through illegal file-sharing.
Australia To Enforce Mandatory Internet Censorship
November 5, 2008, 3:54 pm
Filed under:
1984,
1st amendment,
9/11 Truth,
Airport Security,
Anti-War,
Australia,
Big Brother,
biometrics,
Bloggers,
Britain,
California,
cashless society,
cell phones,
Censorship,
China,
Cold War,
Congress,
Control Grid,
copyright,
Darpa,
data mining,
DHS,
Dictatorship,
Dissent,
Echelon,
Empire,
Europe,
european union,
facebook,
False Flag,
free speech,
George Bush,
Germany,
global elite,
global government,
Globalism,
google,
gps,
Homeland Security,
inside job,
internet,
Internet 2,
internet blackout,
internet censorship,
Internet Filtering,
internet of things,
internet police,
IOT,
IP,
ISP,
John McCain,
john roberts,
korea,
london,
Media,
michael chertoff,
microchip,
microchips,
Microsoft,
nanny state,
New World Order,
New York,
Oppression,
orwell,
Pentagon,
Police State,
Propaganda,
RFID,
RIAA,
Science and technology,
south korea,
Spy,
Surveillance,
Tony Blair,
uav,
United Kingdom,
US Constitution,
Verichip,
War On Terror,
White House | Tags:
HP,
incheon,
intel,
internet regulation,
john reid,
korea,
motorola,
National Intelligence Council,
new songdo city,
NIC,
NWO,
paul otellini,
privacy,
Recording Industry Association of America,
seoul,
u-city,
Ubiquitous computing,
Ubiquitous living,
Ubiquitous positioning,
utopia,
Video and Image Retrieval and Analysis Tool,
VIRAT
Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter
Paul Joseph Watson
Prison Planet
October 29, 2008
The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.
A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.
The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.
The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.
Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).
Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”
Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.
This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.
Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.
Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.
The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.
If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.
Indeed, Prime Minister Tony Blair called for Internet censorship last year.
In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.
Moves to regulate the web have increased over the last two years.
– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.
– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.
– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”
– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.
– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.
– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.
– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.
– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.
– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.
– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.
– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.
– The EU also proposed legislation that would prevent users from uploading any form of video without a license.
– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”
Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.
DARPA building search engine for video surveillance footage
Ars Technica
October 21, 2008
The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.
According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.
The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.
Read Full Article Here
EU Set to Move ‘Internet of Things’ Closer to Reality
Daniel Taylor
Old-Thinker News
November 2, 2008
If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.
The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,
“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”
Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.
Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.
The Internet of Things
Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).
According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.
Reporting on the European Union’s pursuit of the IoT, iBLS reports,
“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”
The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.
Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.
South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports
“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’”
An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.
A timeline shown in the April 2008 NIC report
The report outlines uses for the technology:
“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.
Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.
Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”
These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.
DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html
Security services want personal data from sites like Facebook
http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security
UK.gov says: Regulate the internet
http://www.theregister.co.uk/2008/10/20/government_internet_regulation/
Global Police Plan International Face Scanning Database
October 31, 2008, 11:09 am
Filed under:
1984,
4th amendment,
Airport Security,
Big Brother,
biometrics,
Britain,
cell phones,
civil liberties,
civil rights,
Control Grid,
Dictatorship,
DMV,
DNA Database,
domestic terrorism,
Empire,
Europe,
european union,
facial recognition,
FBI,
fingerprints,
global government,
global police force,
Globalism,
internet police,
interpol,
london,
microchip,
microchips,
Military Industrial Complex,
nanny state,
New World Order,
NWO,
Oregon,
orwell,
Police State,
smoking ban,
Surveillance,
United Kingdom,
US Constitution,
War On Terror,
world police force | Tags:
cop cams,
International Criminal Police Organization,
Northrop-Grumman,
red light camera,
Server in the Sky,
speeding
Global Police Plan International Face Scanning Database
Steve Watson
Infowars.net
October 20, 2008
Global security authorities are to push for a huge biometric facial scan database of international travelers so they can cross-check everyone against a database of terror suspects, international criminals and fugitives.
Interpol, the International Criminal Police Organization, is planning to expand its role into the mass screening of passengers moving around the world by creating a face recognition database to catch wanted suspects, reports the London Guardian.
The database will hold the records of every citizen who has ever traveled in and out of the virtually every country in the world, representing intelligence agency style bulk interception of information and sounding alarm bells for civil liberties groups.
Two months ago we reported on the moves underway to phase out passport control officers at airports and replace them with biometric face scanning cameras. The automated face recognition gates match passengers to a digital image stored on a microchip in the new e-passports.
Interpol wants a facial database to be linked into this technology and used in conjunction with its already existing fingerprint and DNA databases, according to Mark Branchflower, head of Interpol’s fingerprint unit.
We have previously noted that the vast array of databases currently being employed by intelligence agencies, government and law enforcement agencies worldwide were designed to be linked together in a system which will tie in the management and control of all facets of life for citizens to one central hub.
Earlier this year we reported on the announcement of a vast intelligence program to establish a global biometric database known as “Server in the Sky” that will collate and provide an ” International Information Consortium” with access to the biometric measurements and personal information of citizens across the globe in the name of fighting the “war on terror”.
As reported by the London Guardian, the plan is being formulated by the FBI with the cooperation of the home offices and law enforcement agencies of American allies. The technology is being supplied by the US defense company Northrop Grumman.
Furthermore, the use of such technology, as we have already seen, will not be limited to the passport control office.
A 2007 British government report muted an extensive upgrade to cctv systems all across the country to incorporate facial scanning technology. The report suggested a central database of every camera and a network allowing access to it could be beneficial.
In the US there are several schemes that use Facial Recognition Technology in conjunction with Federal agencies, tying the technology to traditional documents such as drivers licenses, passports and credit cards.
A biometric face recognition system has already been approved in China and is expected to be used at airports, customs entrances, banks, post offices, residential areas and other public places in the near future.
Other proposals include placing the cameras in every seat on aircraft and installing software to try and automatically detect terrorists or other dangers caused by passengers.
We are assured that cigarette vending machines will employ the technology in order to enforce smoking laws. Similarly, supermarkets in the UK have already started trialing the technology with the justification being a crackdown on underage drinking.
In Japan facial scanning cameras are being installed in train and bus stations to replace tickets in a move to make the individual features of the face a “unique bar code” as part of an antiterrorism and anticrime initiative.
Police in Tokyo are also asking home and shop owners to mount the cameras outside their properties. “Police investigating an incident in the neighborhood would have access to these images.” according to reports.
Cell phones and computers are now also being produced with face scanning cameras.
Telecom & Internet Companies to Check Texts and E-mails
August 17, 2008, 5:29 pm
Filed under:
2-party system,
7/7,
Air Force,
Bloggers,
Britain,
civil liberties,
civil rights,
Control Grid,
corporations,
data mining,
Dictatorship,
Empire,
Europe,
european union,
Fascism,
free speech,
google,
internet,
Internet Filtering,
internet police,
ISP,
left right paradigm,
london,
nanny state,
Nazi,
neocons,
Neolibs,
Oppression,
orwell,
Police State,
privacy rights,
stasi,
stasi tactics,
Surveillance,
telecoms,
United Kingdom,
united nations,
War On Terror,
warrantless search,
warrantless wiretap | Tags:
cyber security,
cyber terrorism,
e-mails,
Home Office,
snooper’s charter,
texting
UK Telecom & Internet Companies to Check Texts and E-mails
Alan Travis
London Guardian
August 13, 2008

Local councils, health authorities and hundreds of other public bodies are to be given the power to access details of everyone’s personal text, emails and internet use under Home Office proposals published yesterday.
Ministers want to make it mandatory for telephone and internet companies to keep details of all personal internet traffic for at least 12 months so it can be accessed for investigations into crime or other threats to public safety.
The Home Office last night admitted that the measure will mean companies have to store “a billion incidents of data exchange a day”. As the measure is the result of an EU directive, the data will be made available to public investigators across Europe.
The consultation paper published yesterday estimates that it will cost the internet industry over £50m to store the mountain of data.
Conservatives and Liberal Democrats last night branded the measure a “snooper’s charter”.
When the measure was floated after the London bombings in 2005 by the then home secretary, Charles Clarke, it was justified on the grounds that it was needed to investigate terrorist plots and organised crime. But the Home Office document makes clear that the personal data will now be available for all sorts of crime and public order investigations and may even be used to prevent people self-harming.
Read Full Article Here
Fairness Doctrine May Give Web Control to Government
August 13, 2008, 4:01 pm
Filed under:
1984,
1st amendment,
2008 Election,
Big Brother,
Bloggers,
Censorship,
comcast,
Congress,
corporations,
corporatism,
Dictatorship,
Empire,
facism,
FCC,
free speech,
google,
house senate,
internet,
Internet 2,
internet blackout,
Internet Filtering,
internet police,
Media,
Nazi,
net neutrality,
poll,
Surveillance,
US Constitution,
Washington D.C. | Tags:
robert mcdowell,
targeted-advertising technology
Fairness Doctrine Might Give Control of Web Content to the Government
Business and Media Institute
August 12, 2008
There’s a huge concern among conservative talk radio hosts that reinstatement of the Fairness Doctrine would all-but destroy the industry due to equal time constraints. But speech limits might not stop at radio. They could even be extended to include the Internet and “government dictating content policy.”
FCC Commissioner Robert McDowell raised that as a possibility after talking with bloggers at the Heritage Foundation in Washington, D.C. McDowell spoke about a recent FCC vote to bar Comcast from engaging in certain Internet practices – expanding the federal agency’s oversight of Internet networks.
The commissioner, a 2006 President Bush appointee, told the Business & Media Institute the Fairness Doctrine could be intertwined with the net neutrality battle. The result might end with the government regulating content on the Web, he warned. McDowell, who was against reprimanding Comcast, said the net neutrality effort could win the support of “a few isolated conservatives” who may not fully realize the long-term effects of government regulation.
“I think the fear is that somehow large corporations will censor their content, their points of view, right,” McDowell said. “I think the bigger concern for them should be if you have government dictating content policy, which by the way would have a big First Amendment problem.”
“Then, whoever is in charge of government is going to determine what is fair, under a so-called ‘Fairness Doctrine,’ which won’t be called that – it’ll be called something else,” McDowell said. “So, will Web sites, will bloggers have to give equal time or equal space on their Web site to opposing views rather than letting the marketplace of ideas determine that?”
McDowell told BMI the Fairness Doctrine isn’t currently on the FCC’s radar. But a new administration and Congress elected in 2008 might renew Fairness Doctrine efforts, but under another name.
“The Fairness Doctrine has not been raised at the FCC, but the importance of this election is in part – has something to do with that,” McDowell said. “So you know, this election, if it goes one way, we could see a re-imposition of the Fairness Doctrine. There is a discussion of it in Congress. I think it won’t be called the Fairness Doctrine by folks who are promoting it. I think it will be called something else and I think it’ll be intertwined into the net neutrality debate.”
A recent study by the Media Research Center’s Culture & Media Institute argues that the three main points in support of the Fairness Doctrine – scarcity of the media, corporate censorship of liberal viewpoints, and public interest – are myths.
Some Web Firms Say They Track Behavior Without Explicit Consent
Ellen Nakashima
Washington Post
August 12, 2008
Several Internet and broadband companies have acknowledged using targeted-advertising technology without explicitly informing customers, according to letters released yesterday by the House Energy and Commerce Committee.
And Google, the leading online advertiser, stated that it has begun using Internet tracking technology that enables it to more precisely follow Web-surfing behavior across affiliated sites.
The revelations came in response to a bipartisan inquiry of how more than 30 Internet companies might have gathered data to target customers. Some privacy advocates and lawmakers said the disclosures help build a case for an overarching online-privacy law.
Read Full Article Here
Anti-War Website Operator Threatened By Armed Thugs
August 10, 2008, 12:11 pm
Filed under:
1st amendment,
Anti-War,
beijing,
California,
Censorship,
China,
Dictatorship,
Empire,
FBI,
free press,
free speech,
internet,
internet blackout,
Internet Filtering,
internet police,
intimidation,
mafia,
Oppression,
Police State,
secret service,
southern california,
US Constitution,
War On Terror | Tags:
huffington post,
IOC,
mike whitney,
tom feeley
Anti-War Website Operator Threatened By Armed Thugs
Paul Joseph Watson
Prison Planet
August 7, 2008
The operator of a leading alternative news and strongly anti-war website has become the target of nefarious thugs apparently in the employ of the U.S. government who have continually harassed him and ordered him to shut down his website.
Tom Feeley, owner and editor of InformationClearingHouse.info, has endured public harassment, home invasions, death threats and threats to his family simply for running a website.
Counterpunch writer Mike Whitney has circulated an e mail describing what happened to Feeley in an attempt to draw attention to the matter.
Whitney writes that earlier this week Feeley’s wife was startled to suddenly discover three well dressed men standing in her kitchen who told her that Tom must “Stop what he is doing on the Internet, NOW!”
To emphasize the point, the thug pulled back his jacket to reveal a gun while barking out the warning.
Tom’s wife was hysterical and refuses to go back to the house. She contacted the FBI but was told there was nothing they could do.
According to Whitney, “The well-dressed man told Tom’s wife that he knew where her son lived, what line of work he was in, and how many children he had.”
Subsequently, two men in a parked car a block from Tom’s mother’s house were spotted using laptops and sped off when they were approached by Tom’s son.
A similar incident had happened four years previously, when Feeley was approached by a stranger in the parking lot of Long’s Drug store in Southern California, after being forced to remain in his car by an accomplice who blocked him from opening the car door. The man told him, “You need to stop what you are doing on the web”.
Tom said the man was overweight and had his shirt untucked. Tom was taken aback, but (after collecting himself said) “What the fuck? Who do you think you are telling me what I can do?”
The man answered, “Tom, I’m just giving you some good advice. You should take my advice, Tom.”
Alex Jones has experienced similar intimidation tactics on several occasions in the past, particularly the scenario that happened to Tom in the parking lot as well as thinly veiled threats against his family.
In every single instance, the best response is to stand up and be vocal in the face of such harassment. Mafia-like thugs only continue to feed on those who put up with such treatment. The most dangerous thing to do is cower and acquiesce to the will of tyrants.
These kind of tactics will only succeed if the thugs think their actions can have any kind of effect. Every time someone in our movement is intimidated or harassed, we should respond only by re-doubling and intensifying our efforts.
I’ll tell you this about Tom Feeley; he is no bullshitter,” writes Whitney, “He is the “real deal” and completely committed to exposing the mob that is presently running our country. He does not understand why, (as he says) “They are reaching down SO far to get someone who just runs web site”. But, the truth is, they are. Someone wants him to “shut up” and they apparently have the muscle to do it. He knows he is in danger.”
Feeley is ditching his cellphone and maintaining a low profile but to his credit, refuses to cave in to the threats and will continue to publish his website.
Drawing attention to Feeley’s situation is of paramount importance to ensure his protection and also to combat head on attempts to create a chilling atmosphere and intimidate journalists and website publishers.
Homeland Security Can Steal Travelers’ Private Property
August 10, 2008, 11:41 am
Filed under:
1984,
4th amendment,
9/11,
Airport Security,
Big Brother,
Canada,
catastrophic event,
cell phones,
Checkpoints,
Control Grid,
DHS,
Homeland Security,
internet,
internet police,
Mexico,
michael chertoff,
nanny state,
orwell,
pedophilia,
Police State,
Problem Reaction Solution,
Ron Paul,
TSA,
Uncategorized,
US Constitution,
war on drugs,
War On Terror,
warrantless search | Tags:
data protection act,
ipod,
laptops
Homeland Security Can Steal Travelers’ Private Property
Laptops, Ipods, cell-phones, flash-drives, and even ’pocket litter’ can be confiscated by Homeland Security agents at the border without probable cause
Lee Rogers
Rogue Government
August 4, 2008

The Department of Homeland Security more popularly known as the Department of Homeland Enslavement has now come out and stated that they have the authority to confiscate people’s personal property including laptops, electronic devices and even paperwork at the border without any probable cause. They also claim that they can hold those items for an unspecified period of time. All of this they claim is justified under the guise of fighting terrorists. It doesn’t matter that thousands of illegal aliens are entering the country from Mexico unchecked. No, instead the Department of Homeland Security thinks its more effective stealing the property of U.S. citizens to keep us safe from terrorists. Any member of the Department of Homeland Security that takes the property of a U.S. citizen without a warrant should immediately be charged with theft. Of course, in this insane world we live in, that will never happen and the people who conduct this activity will probably be given some sort of freedom medal. This is just another case of the government taking a big dump on the Fourth Amendment which at this point is non-existent.
Before getting into the policies themselves, here is the text of the Fourth Amendment.
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
The government cannot search and seize an individual’s property unless they obtain a court order that can only be issued based upon probable cause. Keep that in mind, as we analyze the Department of Homeland Security’s policies.
The following is taken from a Washington Post piece covering these policies:
Federal agents may take a traveler’s laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed.
Also, officials may share copies of the laptop’s contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement.
This policy is obviously illegal as it is not in accordance with the Fourth Amendment of the Constitution. The Constitution is the supreme law of the land, which makes this policy null and void. What’s really insane, is that they claim they have the authority to share the data on these electronic devices with anyone they want for any specific purpose. It is bad enough that these clowns say that they can take laptops and electronic devices without any probable cause, but they also claim that they can take people’s papers including books, pamphlets and written materials. The insanity of this is unparalleled.
Also from the Washington Post report:
The policies cover “any device capable of storing information in digital or analog form,” including hard drives, flash drives, cell phones, iPods, pagers, beepers, and video and audio tapes. They also cover “all papers and other written documentation,” including books, pamphlets and “written materials commonly referred to as ’pocket trash’ or ’pocket litter.’ “
How can the Department of Homeland Security declare that they have these powers when it is clearly not in accordance with the Constitution? There needs to be an investigation into the criminals that drafted these policies. They should start the investigation at the very top with the Skeletor look-a-like Michael Chertoff who as head of the agency has willingly implemented all sorts of illegal policies and programs under the guise of this phony terror war.
Again from the Washington Post report:
Homeland Security Secretary Michael Chertoff wrote in an opinion piece published last month in USA Today that “the most dangerous contraband is often contained in laptop computers or other electronic devices.” Searches have uncovered “violent jihadist materials” as well as images of child pornography, he wrote.
Even if you believe Chertoff’s claims on contraband and believe the bogus terror war is real, it doesn’t warrant the Department Homeland Security going on fishing expeditions. Assuming the false reality of the terror war is real, one has to question’s Chertoff’s sanity considering that he is focusing more of the government’s resources on seizing people’s laptops and personal property with no probable cause than stopping illegal aliens entering the United States unchecked from Mexico. Wouldn’t it be more likely that a terrorist would try to come into the country undetected instead of going through border checkpoints? This is especially true, considering that there is militarized combat and drug trafficking taking place frequently on the U.S.-Mexico border. Of course, Chertoff doesn’t care about any of that.
The bottom line is that the terror war is not real and everything Chertoff is implementing is designed to enslave the American people. People are more likely to die in a car accident or in a swimming pool than from an act of terrorism. The Department of Homeland Security should be abolished and at the very least, Chertoff and his minions should find their way to unemployment lines. This policy of seizing people’s personal property is a clear violation of the Fourth Amendment, and the people who are responsible for drafting and implementing this policy need to be put in prison.
Be sure to check out these other articles analyzing this illegal search and seizure policy by the Department of Homeland Security.
Detroit Free Press: Leave My Laptop Alone
Information Week: All Your Laptops Belong To Us
LA Times: Feds Now Arrest Your Laptops At Border
Ron Paul sponsors ’Data Protection Act’: Border agents require “reasonable suspicion” to search or confiscate laptops
Fort Bend Now
August 7, 2008
Ron Paul has sponsored legislation designed to require border agents to have “reasonable suspicion” to search the digital equipment of a traveler entering the United States.
Paul said his legislation would force Department of Homeland Security agents to have at least reasonable suspicion that a person has engaged, or is about to engage, in criminal activity before they can search a traveler’s digital equipment. Currently, he pointed out, federal officers can search or seize a traveler’s laptop computer, Blackberry or other electronic device without cause.
That, Paul said, is unconstitutional.
Read Full Article Here
China Spying On Internet Use In Hotels
August 2, 2008, 4:29 pm
Filed under:
1984,
2008 olympics,
beijing,
Big Brother,
CCTV,
Censorship,
China,
civil liberties,
civil rights,
George Bush,
google,
human rights,
internet,
internet blackout,
Internet Filtering,
internet police,
Iraq,
neocons,
olympics,
Oppression,
orwell,
Police State,
sam brownback,
Senate,
Spy,
Surveillance,
warrantless search,
warrantless wiretap | Tags:
falungong,
falungong practitioners,
Public Security Bureau
China Spying On Internet Use In Hotels
AP
July 29, 2008

Foreign-owned hotels in China face the prospect of “severe retaliation” if they refuse to install government software that can spy on Internet use by hotel guests coming to watch the summer Olympic games, a U.S. lawmaker said Tuesday.
Sen. Sam Brownback, R-Kan., produced a translated version of a document from China’s Public Security Bureau that requires hotels to use the monitoring equipment.
“These hotels are justifiably outraged by this order, which puts them in the awkward position of having to craft pop-up messages explaining to their customers that their Web history, communications, searches and key strokes are being spied on by the Chinese government,” Brownback said at a news conference.
A spokesman for the Chinese embassy in Washington did not immediately respond to a request for comment.
Brownback said several international hotel chains confirmed receiving the order from China’s Public Security Bureau. The hotels are in a bind, he said, because they don’t want to comply with the order, but also don’t want to jeopardize their investment of millions of dollars to expand their businesses in China. The hotel chains that forwarded the order to Brownback are declining to reveal their identities for fear of reprisal.
Earlier this year, the U.S. State Department issued a fact sheet warning travelers attending the Olympic games that “they have no reasonable expectation of privacy in public or private locations” in China.
“All hotel rooms and offices are considered to be subject to on-site or remote technical monitoring at all times,” the agency states.
The Public Security Bureau order threatens that failure to comply could result in financial penalties, suspending access to the Internet or the loss of a license to operate a hotel in China.
“If you were a human rights advocate, if you’re a journalist, you’re in room 1251 of a hotel, anything that you use, sending out over the Internet is monitored in real time by the Chinese Public Security bureau,” Brownback said. “That’s not right. It’s not in the Olympic spirit.”
Brownback and other lawmakers have repeatedly denounced China’s record of human rights abuses and asked President Bush not to attend the Olympic opening ceremonies in Beijing.
Brownback was introducing a resolution in the Senate on Tuesday that urges China to reverse its actions.
Read Full Article Here
China To Censor Internet During Olympics
AP
July 29, 2008
China will censor the Internet used by foreign media during the Olympics, an organising committee official confirmed Wednesday, reversing a pledge to offer complete media freedom at the games.
“During the Olympic Games we will provide sufficient access to the Internet for reporters,” said Sun Weide, spokesman for the organising committee.
He confirmed, however, that journalists would not be able to access information or websites connected to the Falungong spiritual movement which is banned in China.
Other sites were also unavailable to journalists, he said, without specifying which ones.
Olympic panel ends ban, says Iraq can go to games
http://home.peoplepc.com/..3421_1334520080729-294375139
China Hits Back At U.S. Stands Firm On Internet
http://news.yahoo.com/s/afp/2008073..sGtapUp0mOsYxUinOROrgF
Google Says Privacy Doesn’t Exist, Get Used To Everyone Knowing Everything About You
http://www.informationweek.com/b..R0QSNDLPSKHSCJUNN2JVN
AU: Pirated music on Ipods could mean jail
August 2, 2008, 3:27 pm
Filed under:
1984,
Airport Security,
apple,
Australia,
Big Brother,
Control Grid,
internet,
internet police,
nanny state,
orwell,
Police State,
prison industrial complex,
Surveillance,
TSA,
War On Terror | Tags:
ipod,
laptops
AU: Pirated music on Ipods could mean jail
MUSIC fans might soon have their iPods and laptops searched by Customs officers at airport checks and face jail if a large amount of pirated music is found on them.
News.com.au
July 28, 2008
The push for the unprecedented searches of travellers’ laptops and MP3 players has been revealed in a leaked discussion paper relating to a treaty being negotiated by the Federal Government.
It suggests criminal sanctions for infringements on a commercial scale.
That meant innocent pop and rock fans with huge song libraries could unwittingly be hit with jail for commercial piracy, according to Internet Industry Association chief executive Peter Coroneos.
“It talks about (sanctions for) commercial infringements does that mean one, 10, 20 or 1000 songs?
“It could be that people get sent to jail for being in possession of commercial-scale quantities of copied music.”
Press TV.com Branded “Terrorist” Website
July 31, 2008, 3:51 pm
Filed under:
Bloggers,
Censorship,
domestic terror,
domestic terrorism,
internet,
internet blackout,
Internet Filtering,
internet police,
Iran,
Media,
Tehran,
War On Terror | Tags:
gus bilirakis,
press TV,
SDGT,
Specially Designated Global Terrorist
Press TV.com Branded “Terrorist” Website
The Truth Seeker
July 27, 2008
The United States House of Representatives introduced a resolution Saturday that seeks to label several media outlets ’Specially Designated Global Terrorist’ (SDGT) organizations.
Among those media outlets named in US House Resolution 1308, introduced June 26, were several TV Stations, including Iran’s Press TV and its web site.
Based in Tehran, Press TV is an English language news service funded by the Iranian government, which has stated its intention to cover world news differently from the western dominated global news media.
Many in the Independent Internet news media regularly refer to or use reports from Press TV.
Included among those who refer to Press TV’s Internet news reports are these web sites, What Really Happened and even Google’s own news service.
How much longer before they are accused of assisting “terrorists” by referring to Press TV’s reports?
In response Saturday, Tehran said Washington sought to label Iran’s international English news services as “terrorist” because it wanted to keep international public opinion in the dark.
The resolution, sponsored by Representative Gus Bilirakis, Republican from Florida, is currently being investigated and revised by House committees before general debate on the Congressional floor.
Latest figures show that 53% of Press TV’s viewers are from the United States.
Google searches could be used against you in court
July 29, 2008, 2:53 pm
Filed under:
1984,
4th amendment,
Big Brother,
CIA,
CNBC,
corporations,
corporatism,
Dictatorship,
Empire,
Fascism,
FBI,
google,
internet,
Internet 2,
internet police,
IP,
Nazi,
orwell,
pedophilia,
Police State,
Surveillance,
US Constitution | Tags:
court,
data mining,
Echelon,
google searches,
keywords
Google searches could be used against you in court