Filed under: China, Communism, Empire, human rights, made in china, Microsoft, Oppression, slavery, socialism, sweatshops, third world | Tags: Acer, Foxconn, Hewlett-Packard, Logitech
Microsoft’s Chinese Workers Only Make $0.52 an Hour
Daily Mail
April 18, 2010
![]() The image Microsoft doesn’t want you to see: Too tired to stay awake, the Chinese workers earning just 34p an hour |
Showing Chinese sweatshop workers slumped over their desks with exhaustion, it is an image that Microsoft won’t want the world to see.
Employed for gruelling 15-hour shifts, in appalling conditions and 86f heat, many fall asleep on their stations during their meagre ten-minute breaks.
For as little as 34p an hour, the men and women work six or seven days a week, making computer mice and web cams for the American multinational computer company.
This photo and others like it were smuggled out of the KYE Systems factory at Dongguan, China, as part of a three-year investigation by the National Labour Committee, a human rights organisation which campaigns for workers across the globe.
The mostly female workers, aged 18 to 25, work from 7.45am to 10.55pm, sometimes with 1,000 workers crammed into one 105ft by 105ft room.
They are not allowed to talk or listen to music, are forced to eat substandard meals from the factory cafeterias, have no bathroom breaks during their shifts and must clean the toilets as discipline, according to the NLC.
The workers also sleep on site, in factory dormitories, with 14 workers to a room. They must buy their own mattresses and bedding, or else sleep on 28in-wide plywood boards. They ‘shower’ with a sponge and a bucket.
And many of the workers, because they are young women, are regularly sexually harassed, the NLC claimed.
The organisation said that one worker was even fined for losing his finger while operating a hole punch press.
Microsoft is not the only company to outsource manufacturing to KYE, but it accounts for about 30 per cent of the factory’s work, the NLC said. Companies such as Hewlett-Packard, Samsung, Foxconn, Acer, Logitech and Asus also use KYE Systems.
Microsoft, which exports much of the hardware made at the factory to America, Europe and Japan, said that it is taking the claims seriously and has begun an investigation.
One employee told the NLC: ‘We are like prisoners. It seems like we live only to work – we do not work to live. We do not live a life, only work.’
The NLC’s report included an account from one worker whose job consisted entirely of sticking self adhesive rubber feet to the bottom of Microsoft computer mice.
But the monotony of sitting or standing for 12 hours, applying foot after foot to mouse after mouse, was not the worst of the worker’s testimony.
It was the militaristic management and sleep deprivation that affected the worker most. ‘I know I can choose not to work overtime, but if I don’t work overtime then I am stuck with only 770 Chinese yuan (£72.77p) per month in basic wages,’ the worker said.
‘This is not nearly enough to support a family. My parents are farmers without jobs. They also do not have pensions.
‘I also need to worry about getting married, which requires a lot of money. Therefore, I still push myself to continue working in spite of my exhaustion.
‘When I finish my four hours of overtime, I’m extremely tired. At that time, even if someone offered me an extravagant dinner, I’d probably refuse. I just want to sleep.’
Charles Kernaghan, executive director of the NLC, said: ‘It sounded like torture – the frantic pace on the assembly line, same motion over and over for the 12 hours or more of work they did.’
Microsoft said it was committed to the ‘fair treatment and safety of workers’. A spokesman added: ‘We are aware of the NLC report and we have commenced an investigation.
‘We take these claims seriously and we will take appropriate remedial measures in regard to any findings of misconduct.’
Filed under: aristocrats, bill gates, carbon dioxide, climate change, Co2, Communism, cult, dangerous vaccines, darwinist, deadly vaccinations, deadly vaccines, depopulation, Dictatorship, doomsday cult, Empire, endgame, Eugenics, Fascism, final solution, Genocide, global elite, Global Warming, health care reform, Hitler, Holocaust, IBM, innoculation, internationalist, malthusian catastrophe, Microsoft, Nazi, Neolibs, obama care, obamacare, Population Control, Propaganda, socialism, sterilization, united nations
Bill Gates talks about ‘vaccines to reduce population’
World told to adopt China’s one child policy
Genocidal Climate Change Policy is Killing Third World Nations
Obama Science Advisor Advocates Forced Abortions
Sterilizing pregnant mothers with tetanus vaccines, babies die
Hillary Clinton Links Over-Population to Global Warming
Filed under: 1984, augmented earth, Big Brother, biometrics, cameras, cell phone, cell phones, CNN, Control Grid, Darpa, data mining, Dictatorship, Echelon, Empire, global elite, global government, Globalism, google, google earth, government control, government takeover, gps, internet, Internet 2, internet 3, internet of things, internet police, IOT, Media, microchip, microchips, Microsoft, nanny state, New World Order, NWO, Oppression, orwell, Pentagon, Police State, RFID, RFID bracelet, Science and technology, south korea, Spy, Surveillance, surveillance cameras, Total Information Awareness, traffic cameras, uav, Verichip | Tags: intel, internet regulation, korea, motorola, National Intelligence Council, new songdo city, NIC, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool
Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather
Cryptogon
September 30, 2009
The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.
Tice never did tell his story to Congress about this different aspect of the program.
Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.
—Synthetic Environments for Analysis and Simulation
Via: Popular Science:
Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.
They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.
They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.
From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.
Up next, they say they want to add weather, birds, and motion in rivers.
Ubiquitous Computing: Big Brother’s All-Seeing Eye
Filed under: 1984, 1st amendment, 9/11 Truth, Airport Security, Anti-War, Australia, Big Brother, biometrics, Bloggers, Britain, California, cashless society, cell phones, Censorship, China, Cold War, Congress, Control Grid, copyright, Darpa, data mining, DHS, Dictatorship, Dissent, Echelon, Empire, Europe, european union, facebook, False Flag, free speech, George Bush, Germany, global elite, global government, Globalism, google, gps, Homeland Security, inside job, internet, Internet 2, internet blackout, internet censorship, Internet Filtering, internet of things, internet police, IOT, IP, ISP, John McCain, john roberts, korea, london, Media, michael chertoff, microchip, microchips, Microsoft, nanny state, New World Order, New York, Oppression, orwell, Pentagon, Police State, Propaganda, RFID, RIAA, Science and technology, south korea, Spy, Surveillance, Tony Blair, uav, United Kingdom, US Constitution, Verichip, War On Terror, White House | Tags: HP, incheon, intel, internet regulation, john reid, korea, motorola, National Intelligence Council, new songdo city, NIC, NWO, paul otellini, privacy, Recording Industry Association of America, seoul, u-city, Ubiquitous computing, Ubiquitous living, Ubiquitous positioning, utopia, Video and Image Retrieval and Analysis Tool, VIRAT
Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter
Paul Joseph Watson
Prison Planet
October 29, 2008
The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.
A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.
The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.
The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.
Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).
Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”
Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.
This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.
Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.
Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.
The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.
If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.
Indeed, Prime Minister Tony Blair called for Internet censorship last year.
In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.
Moves to regulate the web have increased over the last two years.
– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.
– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.
– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”
– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.
– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.
– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.
– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.
– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.
– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.
– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.
– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.
– The EU also proposed legislation that would prevent users from uploading any form of video without a license.
– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”
Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.
DARPA building search engine for video surveillance footage
Ars Technica
October 21, 2008
The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.
According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.
The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.
EU Set to Move ‘Internet of Things’ Closer to Reality
Daniel Taylor
Old-Thinker News
November 2, 2008
If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.
The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,
“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”
Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.
Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.
The Internet of Things
Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).
According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.
Reporting on the European Union’s pursuit of the IoT, iBLS reports,
“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”
The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.
Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.
South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports
“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’”
An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.
A timeline shown in the April 2008 NIC report
The report outlines uses for the technology:
“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.
Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.
Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”
These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.
DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html
Security services want personal data from sites like Facebook
http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security
UK.gov says: Regulate the internet
http://www.theregister.co.uk/2008/10/20/government_internet_regulation/
Filed under: 1984, 1st amendment, 2-party system, 4th amendment, ACLU, Airport Security, apple, army, Barack Obama, biden, Big Brother, biometrics, Bush Sr., CIA, civil liberties, civil rights, Congress, copyright, Department of justice, Dianne Feinstein, DOJ, EFF, FBI, FCC, fingerprints, FISA, free speech, George Bush, Hillary Clinton, House, Iraq, joe biden, John McCain, left right paradigm, Microsoft, Military, nanny state, nation building, neocons, Neolibs, net neutrality, NSA, obama, occupation, OKC bombing, orwell, Patriot Act, Police State, Posse Comitatus, privacy rights, RIAA, Robert Gates, Ron Paul, Russ Feingold, Senate, Spy, Surveillance, tax, Taxpayers, telecoms, TSA, US Constitution, verison, war on drugs, War On Terror, warrantless search, warrantless wiretap, White House | Tags: Communications Assistance for Law Enforcement Act, Comprehensive Counter-Terrorism Act, Digital Millennium Copyright Act, Digital Telephony law, Drano bomb, drug paraphernalia, ebay, Illicit Drug Anti-Proliferation Act, Improvised Munitions Handbook, kazaa, marijuana, news corp., Omnibus Counterterrorism Act of 1995, p2p, Perform Act, pgp, rave act, Senate Foreign Relations committee, tommy chong, Violent Crime Control Act, XM, Yahoo!, zfone
Joe Biden’s pro-RIAA, pro-FBI tech voting record
CNET
August 23, 2008
By choosing Joe Biden as their vice presidential candidate, the Democrats have selected a politician with a mixed record on technology who has spent most of his Senate career allied with the FBI and copyright holders, who ranks toward the bottom of CNET’s Technology Voters’ Guide, and whose anti-privacy legislation was actually responsible for the creation of PGP.
That’s probably okay with Barack Obama: Biden likely got the nod because of his foreign policy knowledge. The Delaware politician is the chairman of the Senate Foreign Relations committee who voted for the war in Iraq, and is reasonably well-known nationally after his presidential campaigns in 1988 and 2008.
Copyright
But back to the Delaware senator’s tech record. After taking over the Foreign Relations committee, Biden became a staunch ally of Hollywood and the recording industry in their efforts to expand copyright law. He sponsored a bill in 2002 that would have make it a federal felony to trick certain types of devices into playing unauthorized music or executing unapproved computer programs. Biden’s bill was backed by content companies including News Corp. but eventually died after Verizon, Microsoft, Apple, eBay, and Yahoo lobbied against it.
A few months later, Biden signed a letter that urged the Justice Department “to prosecute individuals who intentionally allow mass copying from their computer over peer-to-peer networks.” Critics of this approach said that the Motion Picture Association of America and the Recording Industry Association of America, and not taxpayers, should pay for their own lawsuits.
Last year, Biden sponsored an RIAA-backed bill called the Perform Act aimed at restricting Americans’ ability to record and play back individual songs from satellite and Internet radio services. (The RIAA sued XM Satellite Radio over precisely this point.)
All of which meant that nobody in Washington was surprised when Biden was one of only four U.S. senators invited to a champagne reception in celebration of the Digital Millennium Copyright Act hosted by the MPAA’s Jack Valenti, the RIAA, and the Business Software Alliance. (Photos are here.)
Now, it’s true that few Americans will cast their votes in November based on what the vice presidential candidate thinks of copyright law. But these pro-copyright views don’t exactly jibe with what Obama has promised; he’s pledged to “update and reform our copyright and patent systems to promote civic discourse, innovation and investment while ensuring that intellectual property owners are fairly treated.” These are code words for taking a more pro-EFF (Electronic Frontier Foundation) than pro-MPAA approach.
Unfortunately, Biden has steadfastly refused to answer questions on the topic. We asked him 10 tech-related questions, including whether he’d support rewriting the Digital Millennium Copyright Act, as part of our 2008 Technology Voters’ guide. Biden would not answer (we did hear back from Barack Obama, Hillary Clinton, John McCain, and Ron Paul).
In our 2006 Technology Voters’ Guide, which ranked Senate votes from July 1998 through May 2005, Biden received a mere 37.5 percent score because of his support for Internet filters in schools and libraries and occasional support for Internet taxes.
Privacy, the FBI, and PGP
On privacy, Biden’s record is hardly stellar. In the 1990s, Biden was chairman of the Judiciary Committee and introduced a bill called the Comprehensive Counter-Terrorism Act, which the EFF says he was “persuaded” to do by the FBI. A second Biden bill was called the Violent Crime Control Act. Both were staunchly anti-encryption, with this identical language:
It is the sense of Congress that providers of electronic communications services and manufacturers of electronic communications service equipment shall ensure that communications systems permit the government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law.
Translated, that means turn over your encryption keys. The book Electronic Privacy Papers describes Biden’s bill as representing the FBI’s visible effort to restrict encryption technology, which was taking place in concert with the National Security Agency’s parallel, but less visible efforts. (Biden was no foe of the NSA. He once described now-retired NSA director Bobby Ray Inman as the “single most competent man in the government.”)
Biden’s bill — and the threat of encryption being outlawed — is what spurred Phil Zimmermann to write PGP, thereby kicking off a historic debate about export controls, national security, and privacy. Zimmermann, who’s now busy developing Zfone, says it was Biden’s legislation “that led me to publish PGP electronically for free that year, shortly before the measure was defeated after vigorous protest by civil libertarians and industry groups.”
While neither of Biden’s pair of bills became law, they did foreshadow the FBI’s pro-wiretapping, anti-encryption legislative strategy that followed — and demonstrated that the Delaware senator was willing to be a reliable ally of law enforcement on the topic. (They also previewed the FBI’s legislative proposal later that decade for banning encryption products such as SSH or PGP without government backdoors, which was approved by one House of Representatives committee but never came to a vote in the Senate.)
“Joe Biden made his second attempt to introduce such legislation” in the form of the Communications Assistance for Law Enforcement Act (CALEA), which was also known as the Digital Telephony law, according to an account in Wired magazine. Biden at the time was chairman of the relevant committee; he co-sponsored the Senate version and dutifully secured a successful floor vote on it less than two months after it was introduced. CALEA became law in October 1994, and is still bedeviling privacy advocates: the FBI recently managed to extend its requirements to Internet service providers.
CALEA represented one step in the FBI and NSA’s attempts to restrict encryption without backdoors. In a top-secret memo to members of President George H.W. Bush’s administration including Defense Secretary Dick Cheney and CIA director Robert Gates, one White House official wrote: “Justice should go ahead now to seek a legislative fix to the digital telephony problem, and all parties should prepare to follow through on the encryption problem in about a year. Success with digital telephony will lock in one major objective; we will have a beachhead we can exploit for the encryption fix; and the encryption access options can be developed more thoroughly in the meantime.”
There’s another reason why Biden’s legislative tactics in the CALEA scrum amount to more than a mere a footnote in Internet history. They’re what led to the creation of the Center for Democracy and Technology — and the Electronic Frontier Foundation’s simultaneous implosion and soul-searching.
EFF staffers Jerry Berman and Danny Weitzner chose to work with Biden on cutting a deal and altering the bill in hopes of obtaining privacy concessions. It may have helped, but it also left the EFF in the uncomfortable position of leaving its imprimatur on Biden’s FBI-backed wiretapping law universally loathed by privacy advocates. The debacle ended with internal turmoil, Berman and Weitzner leaving the group and taking their corporate backers to form CDT, and a chastened EFF that quietly packed its bags and moved to its current home in San Francisco. (Weitzner, who was responsible for a censorship controversy last year, became a formal Obama campaign surrogate.)
“Anti-terror” legislation
The next year, months before the Oklahoma City bombing took place, Biden introduced another bill called the Omnibus Counterterrorism Act of 1995. It previewed the 2001 Patriot Act by allowing secret evidence to be used in prosecutions, expanding the Foreign Intelligence Surveillance Act and wiretap laws, creating a new federal crime of “terrorism” that could be invoked based on political beliefs, permitting the U.S. military to be used in civilian law enforcement, and allowing permanent detection of non-U.S. citizens without judicial review. The Center for National Security Studies said the bill would erode “constitutional and statutory due process protections” and would “authorize the Justice Department to pick and choose crimes to investigate and prosecute based on political beliefs and associations.”
Biden himself draws parallels between his 1995 bill and its 2001 cousin. “I drafted a terrorism bill after the Oklahoma City bombing. And the bill John Ashcroft sent up was my bill,” he said when the Patriot Act was being debated, according to the New Republic, which described him as “the Democratic Party’s de facto spokesman on the war against terrorism.”
Biden’s chronology is not accurate: the bombing took place in April 1995 and his bill had been introduced in February 1995. But it’s true that Biden’s proposal probably helped to lay the groundwork for the Bush administration’s Patriot Act.
In 1996, Biden voted to keep intact an ostensibly anti-illegal immigration bill that outlined what the Real ID Act would become almost a decade later. The bill would create a national worker identification registry; Biden voted to kill an Abraham-Feingold amendment that would have replaced the registry with stronger enforcement. According to an analysis by the Electronic Privacy Information Center, the underlying bill would have required “states to place Social Security numbers on drivers licenses and to obtain fingerprints or some other form of biometric identification for licenses.”
Along with most of his colleagues in the Congress — including Sen. John McCain but not Rep. Ron Paul — Biden voted for the Patriot Act and the Real ID Act (which was part of a larger spending bill). Obama voted for the bill containing the Real ID Act, but wasn’t in the U.S. Senate in 2001 when the original Patriot Act vote took place.
Patriot Act
In the Senate debate over the Patriot Act in October 2001, Biden once again allied himself closely with the FBI. The Justice Department favorably quotes Biden on its Web site as saying: “The FBI could get a wiretap to investigate the mafia, but they could not get one to investigate terrorists. To put it bluntly, that was crazy! What’s good for the mob should be good for terrorists.”
The problem is that Biden’s claim was simply false — which he should have known after a decade of experience lending his name to wiretapping bills on behalf of the FBI. As CDT explains in a rebuttal to Biden: “The Justice Department had the ability to use wiretaps, including roving taps, in criminal investigations of terrorism, just as in other criminal investigations, long before the Patriot Act.”
But Biden’s views had become markedly less FBI-friendly by April 2007, six years later. By then, the debate over wiretapping had become sharply partisan, pitting Democrats seeking to embarrass President Bush against Republicans aiming to defend the administration at nearly any cost. In addition, Biden had announced his presidential candidacy three months earlier and was courting liberal activists dismayed by the Bush administration’s warrantless wiretapping.
That month, Biden slammed the “president’s illegal wiretapping program that allows intelligence agencies to eavesdrop on the conversations of Americans without a judge’s approval or congressional authorization or oversight.” He took aim at Attorney General Alberto Gonzales for allowing the FBI to “flagrantly misuse National Security Letters” — even though it was the Patriot Act that greatly expanded their use without also expanding internal safeguards and oversight as well.
Biden did vote against a FISA bill with retroactive immunity for any telecommunications provider that illegally opened its network to the National Security Agency; Obama didn’t. Both agreed to renew the Patriot Act in March 2006, a move that pro-privacy Democrats including Ron Wyden and Russ Feingold opposed. The ACLU said the renewal “fails to correct the most flawed provisions” of the original Patriot Act. (Biden does do well on the ACLU’s congressional scorecard.)
“Baby-food bombs”
The ACLU also had been at odds with Biden over his efforts to censor bomb-making information on the Internet. One day after a bomb in Saudi Arabia killed several U.S. servicemen and virtually flattened a military base, Biden pushed to make posting bomb-making information on the Internet a felony, punishable by up to 20 years in jail, the Wall Street Journal reported at the time.
“I think most Americans would be absolutely shocked if they knew what kind of bone-chilling information is making its way over the Internet,” he told the Senate. “You can access detailed, explicit instructions on how to make and detonate pipe bombs, light-bulb bombs, and even — if you can believe it — baby-food bombs.”
Biden didn’t get exactly what he wanted — at least not right away. His proposal was swapped in the final law for one requiring the attorney general to investigate “the extent to which the First Amendment protects such material and its private and commercial distribution.” The report was duly produced, concluding that the proposal “can withstand constitutional muster in most, if not all, of its possible applications, if such legislation is slightly modified.”
It was. Biden and co-sponsor Dianne Feinstein introduced their bill again the following year. Biden pitched it as an anti-terror measure, saying in a floor debate that numerous terrorists “have been found in possession of bomb-making manuals and Internet bomb-making information.” He added: “What is even worse is that some of these instructions are geared toward kids. They tell kids that all the ingredients they need are right in their parents’ kitchen or laundry cabinets.”
Biden’s proposal became law in 1997. It didn’t amount to much: four years after its enactment, there had been only one conviction. And instead of being used to snare a dangerous member of Al Qaeda, the law was used to lock up a 20-year old anarchist Webmaster who was sentenced to one year in prison for posting information about Molotov cocktails and “Drano bombs” on his Web site, Raisethefist.com.
Today there are over 10,000 hits on Google for the phrase, in quotes, “Drano bomb.” One is a video that lists the necessary ingredients and shows some self-described rednecks blowing up small plastic bottles in their yard. Then there’s the U.S. Army’s Improvised Munitions Handbook with instructions on making far more deadly compounds, including methyl nitrate dynamite, mortars, grenades, and C-4 plastic explosive — which free speech activists placed online as an in-your-face response to the Biden-Feinstein bill.
Peer-to-peer networks
Since then, Biden has switched from complaining about Internet baby-food bombs to taking aim at peer-to-peer networks. He held one Foreign Relations committee hearing in February 2002 titled “Theft of American Intellectual Property” and invited executives from the Justice Department, RIAA, MPAA, and Microsoft to speak. Not one Internet company, P2P network, or consumer group was invited to testify.
Afterwards, Sharman Networks (which distributes Kazaa) wrote a letter to Biden complaining about “one-sided and unsubstantiated attacks” on P2P networks. It said: “We are deeply offended by the gratuitous accusations made against Kazaa by witnesses before the committee, including ludicrous attempts to associate an extremely beneficial, next-generation software program with organized criminal gangs and even terrorist organizations.”
Biden returned to the business of targeting P2P networks this year. In April, he proposed spending $1 billion in U.S. tax dollars so police can monitor peer-to-peer networks for illegal activity. He made that suggestion after a Wyoming cop demonstrated a proof-of-concept program called “Operation Fairplay” at a hearing before a Senate Judiciary subcommittee.
A month later, the Senate Judiciary committee approved a Biden-sponsored bill that would spend over $1 billion on policing illegal Internet activity, mostly child pornography. It has the dubious virtue of being at least partially redundant: One section would “prohibit the broadcast of live images of child abuse,” even though the Justice Department has experienced no problems in securing guilty pleas for underage Webcamming. (The bill has not been voted on by the full Senate.)
Online sales of Robitussin
Around the same time, Biden introduced his self-described Biden Crime Bill of 2007. One section expands electronic surveillance law to permit police wiretaps in “crimes dangerous to the life, limb, and well-being of minor children.” Another takes aim at Internet-based telemedicine and online pharmacies, saying that physicians must have conducted “at least one in-person medical evaluation of the patient” to prescribe medicine.
Another prohibits selling a product containing dextromethorphan — including Robitussin, Sucrets, Dayquil, and Vicks — “to an individual under the age of 18 years, including any such sale using the Internet.” It gives the Justice Department six months to come up with regulations, which include when retailers should be fined for shipping cough suppressants to children. (Biden is a longtime drug warrior; he authored the Illicit Drug Anti-Proliferation Act that the Bush administration used to shut down benefit concerts.)
Net neutrality
On Net neutrality, Biden has sounded skeptical. In 2006, he indicated that no preemptive laws were necessary because if violations do happen, such a public outcry will develop that “the chairman will be required to hold this meeting in this largest room in the Capitol, and there will be lines wandering all the way down to the White House.” Obama, on the other hand, has been a strong supporter of handing pre-emptive regulatory authority to the Federal Communications Commission.
Tommy Chong: Biden ’authored the bill that put me in jail’
KXMB
August 24, 2008
It turns out that Obama’s new running mate is one of the leading crusaders in the war on drugs. Which isn’t something that’s likely to sit well with Obama’s base of young, college-aged supporters
Earlier this week, in an interview with the Washington Post, Tommy Chong was asked what the average citizen can do to further the cause of decriminalization. “Check out the people you’re voting for,” Chong replied. “For instance, Joseph Biden comes off as a liberal Democrat, but he’s the one who authored the bill that put me in jail. He wrote the law against shipping drug paraphernalia through the mail – which could be anything from a pipe to a clip or cigarette papers.”
Barack Obama’s V.P. selection Sen. Joe Biden also spnsored the Rave Act, which targets music events where drug use is allegedly prevalent.
http://abcnews.go.com/Blotter/story?id=5670703&page=1
Barack Obama: The Next PRESIDENT Is Joe Biden
http://www.youtube.com/watch?v=RElChQ6g2Io
VP Choice Biden Unpopular in Iraq: He’s creator of the idea of dividing Iraq
http://africa.reuters.com/world/news/usnLN96984.html
Biden’s Bill: The Patriot Act
http://www.tnr.com/columnist..582-b6ec-444834c9df73&k=93697
Biden called for unilateral Iraq invasion – in 1998
http://www.fpif.org/fpiftxt/5492
Filed under: 1984, 1st amendment, Alex Jones, AOL, apple, Australia, Big Brother, bill gates, Britain, Canada, Censorship, China, comcast, Communism, corporatism, DHS, Europe, european union, Fascism, FCC, France, free speech, Homeland Security, Internet 2, internet blackout, Internet Filtering, internet police, internet tax, ISP, ISPs, michael chertoff, Microsoft, net neutrality, NSA, Pentagon, Propaganda, ration, Surveillance, Time Warner, United Kingdom, US Constitution, verison, virgin, War On Terror, White House | Tags: john reid, p2p, ransomware, TELUS
Secret Plan To Kill Internet By 2012
Paul Joseph Watson
Prison Planet
June 11, 2008
ISP’s have resolved to restrict the Internet to a TV-like subscription model where users will be forced to pay to visit selected corporate websites by 2012, while others will be blocked, according to a leaked report. Despite some people dismissing the story as a hoax, the wider plan to kill the traditional Internet and replace it with a regulated and controlled Internet 2 is manifestly provable.
“Bell Canada and TELUS (formerly owned by Verizon) employees officially confirm that by 2012 ISP’s all over the globe will reduce Internet access to a TV-like subscription model, only offering access to a small standard amount of commercial sites and require extra fees for every other site you visit. These ’other’ sites would then lose all their exposure and eventually shut down, resulting in what could be seen as the end of the Internet,” warns a report that has spread like wildfire across the web over the last few days.
The article, which is accompanied by a You Tube clip, states that Time Magazine writer “Dylan Pattyn” has confirmed the information and is about to release a story – and that the move to effectively shut down the web could come as soon as 2010.
People have raised questions about the report’s accuracy because the claims are not backed by another source, only the “promise” that a Time Magazine report is set to confirm the rumor. Until such a report emerges many have reserved judgment or outright dismissed the story as a hoax.
What is documented, as the story underscores, is the fact that TELUS’ wireless web package allows only restricted pay-per-view access to a selection of corporate and news websites. This is the model that the post-2012 Internet would be based on.
People have noted that the authors of the video seem to be more concerned about getting people to subscribe to their You Tube account than fighting for net neutrality by prominently featuring an attractive woman who isn’t shy about showing her cleavage. The vast majority of the other You Tube videos hosted on the same account consist of bizarre avante-garde satire skits on behalf of the same people featured in the Internet freedom clip. This has prompted many to suspect that the Internet story is merely a stunt to draw attention to the group.
Whether the report is accurate or merely a crude hoax, there is a very real agenda to restrict, regulate and suffocate the free use of the Internet and we have been documenting its progression for years.
The first steps in a move to charge for every e mail sent have already been taken. Under the pretext of eliminating spam, Bill Gates and other industry chieftains have proposed Internet users buy credit stamps which denote how many e mails they will be able to send. This of course is the death knell for political newsletters and mailing lists.
The New York Times reported that “America Online and Yahoo, two of the world’s largest providers of e-mail accounts, are about to start using a system that gives preferential treatment to messages from companies that pay from 1/4 of a cent to a penny each to have them delivered. The senders must promise to contact only people who have agreed to receive their messages, or risk being blocked entirely.”
The first wave will simply attempt to price people out of using the conventional Internet and force people over to Internet 2, a state regulated hub where permission will need to be obtained directly from an FCC or government bureau to set up a website.
The original Internet will then be turned into a mass surveillance database and marketing tool. The Nation magazine reported in 2006 that, “Verizon, Comcast, Bell South and other communications giants are developing strategies that would track and store information on our every move in cyberspace in a vast data-collection and marketing system, the scope of which could rival the National Security Agency. According to white papers now being circulated in the cable, telephone and telecommunications industries, those with the deepest pockets–corporations, special-interest groups and major advertisers–would get preferred treatment. Content from these providers would have first priority on our computer and television screens, while information seen as undesirable, such as peer-to-peer communications, could be relegated to a slow lane or simply shut out.”
Over the past few years, a chorus of propaganda intended to demonize the Internet and further lead it down a path of strict control has spewed forth from numerous establishment organs:
- Time magazine reported last year that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time.
- In a display of bi-partisanship, there have recently been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.
-
The White House’s own recently de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.
-
The Pentagon recently announced its effort to infiltrate the Internet and propagandize for the war on terror.
-
In a speech last October, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will go into operation next year.
-
The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.
-
A landmark legal case on behalf of the Recording Industry Association of America and other global trade organizations seeks to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument is supported by the U.S. government.
-
A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.
-
The European Union, led by former Stalinist and potential future British Prime Minister John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.
-
The EU data retention bill, passed last year after much controversy and with implementation tabled for late 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, SMS messages, emails and instant messaging services.
-
The EU also recently proposed legislation that would prevent users from uploading any form of video without a license.
- The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”
The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.
The development of a new form of internet with new regulations is also designed to create an online caste system whereby the old internet hubs would be allowed to break down and die, forcing people to use the new taxable, censored and regulated world wide web.
Make no mistake, the internet, one of the greatest outposts of free speech ever created is under constant attack by powerful people who cannot operate within a society where information flows freely and unhindered. Both American and European moves mimic stories we hear every week out of state controlled Communist China, where the internet is strictly regulated and virtually exists as its own entity away from the rest of the web.
The Internet is freedom’s best friend and the bane of control freaks. Its eradication is one of the short term goals of those that seek to centralize power and subjugate their populations under tyranny by eliminating the right to protest and educate others by the forum of the free world wide web.
http://www.prisonplanet.com/articles/june2008/061208_pull_plug.htm
Ransomware: Hackers can hold your PC files for ransom
http://blogs.computerworld.com/rans..are_armageddon_approaches
Record Percentage Of Americans Use Internet For Politics, Survey Finds
http://blog.wired.com/27bstroke6/2008/06/record-percenta.html
Copyright deal could toughen rules governing info on iPods, computers
http://www.canada.com/topics/t..ae997868-220b-4dae-bf4f-47f6fc96ce5e
Charging by the Byte to Curb Internet Traffic
http://www.nytimes.com/2008/06/1..&pagewanted=print&oref=slogin
Filed under: 1984, Big Brother, biometrics, google, microchip, Microsoft, Minority Report, RFID, Surveillance, warrantless wiretap | Tags: comcast, Gerard Kunkel, Minority Report, TiVo
Comcast denies developing cameras in cable boxes
Paul Joseph Watson
Prison Planet
March 25, 2008
Comcast has denied that it is developing camera devices built in to cable boxes that monitor consumers as they enter the room, despite the fact that Vice-President Gerard Kunkel admitted to a journalist that such a move would represent a “holy grail,” and rival companies like TiVo and Microsoft have already filed patents for similar technology.
A firestorm of controversy erupted last week after industry website newteevee.com carried an article by Chris Albrecht which revealed that Comcast was, “experimenting with different camera technologies built into devices so it can know who’s in your living room”.
How did Albrecht know? Because Comcast’s senior VP of user experience Gerard Kunkel told him during the Digital Living Room conference held in San Francisco.
“Perhaps I’ve seen Enemy of the State too many times, or perhaps I’m just naive about the depths to which Comcast currently tracks my every move,” wrote Albrecht.
“The idea being that if you turn on your cable box, it recognizes you and pulls up shows already in your profile or makes recommendations. If parents are watching TV with their children, for example, parental controls could appear to block certain content from appearing on the screen. Kunkel also said this type of monitoring is the “holy grail” because it could help serve up specifically tailored ads. Yikes.”
Readers responded to the article in droves and most were shocked by the proposals.
“Orwell thought that cameras in the living room would imposed on us by a fascist government. Fascism these days is dominated by corporate power guised under a mantle of legitimacy. These systems of control have been primarily put in place by willful consumption of consumer goods,” wrote one.
“This is not cool, this is not fun, this is not exciting. This is invasive. They’ve been talking about this technology since the inception of cable modems, and there’s a certain amount of tracking in place already. Cameras? Too much,” stated another.
Comcast responded to the article by claiming the device was, “in no way designed to – or capable of – monitoring your living room. These technologies are designed to allow simple navigation on a television set just as the Wii remote uses a camera to manage its much heralded gesture-based interactivity.”
However, Albrecht shot back by pointing out that Kunkel told him the device was explicitly being designed so as to monitor who was entering the living room.
“After you granted me our initial video interview, you brought up the topic of Comcast knowing who was in the living room in a conversation between you, myself and another conference attendee,” writes Albrecht.
“I actually left and came back to follow up on this point while you were talking with that same attendee. At this point, you were aware that I was a reporter and I took handwritten notes in front of you as we talked to make sure I had an accurate accounting of what you were saying,” he added.
Tracking and databasing of consumer’s TV viewing habits is nothing new – for years cable box companies like TiVo have monitored behavior down to the level of what parts of shows viewers rewind or fast forward – an example being Janet Jackson’s wardrobe malfunction during the 2003 Super Bowl half-time show.
Indeed, the monitoring of viewers for the purposes of Minority Report style commercial assaults and viewer customization has been in the works since at least early 2005.
In November 2005, TiVo applied for a patent allowing customization of TV remotes and viewing preferences via an RFID chip the consumer would attach to his or her body – which is just one step away from an embedded microchip in the body.
Microsoft has also applied for a patent that would utilize, “a camera sitting on top of a television set to detect the presence of viewers and identifying them using facial-recognition software — or perhaps a fingerprint scanner in a remote control,” according to a report from Multichannel News.
Similarly, corporations and eventually the government is planning to use microphones in the computers of an estimated 150 million-plus Internet active Americans to spy on their lifestyle choices and build psychological profiles which will be used for surveillance, invasive advertising and data mining.
In 2006, Google announced that they were developing a plan to use in-built microphones to listen in on user’s background noise, be it television, music or radio – and then direct advertising at them based on their preferences.
“The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject,” reported the Register.
Last year the New York Times reported on a venture by Pudding Media, a new company founded by two former Israeli intelligence officers, to offer its customers free Internet phone service in return for their consent to have their conversations monitored for keywords upon which targeted advertising is directed.
“A conversation about movies, for example, will elicit movie reviews and ads for new films that the caller will see during the conversation. Pudding Media is working on a way to e-mail the ads and other content to the person on the other end of the call, or to show it on that person’s cellphone screen,” according to the report.
If you think telesales calls and pop-ups ads are annoying, the new wave of invasive advertising will not only saturate the senses with 24/7 vapid consumerism, but it will signal the death knell for the assumption that privacy is a human right not to be infringed upon by corporations or the state.
Orwell’s telescreens and Minority Report style assaults on our senses may not be born out of government coercion, but as a result of consumers willfully enslaving themselves into this matrix – all for the convenience of enhancing their consumption of programming via the one-eyed brainwashing monster in the corner of the room.
Filed under: 9/11, 9/11 Truth, al-qaeda, Arizona, Australia, Biological Attack, biological warfare, Britain, canadacom, catastrophic event, Continuity of Government, DHS, Europe, False Flag, FBI, Felipe Calderon, George Bush, global government, global police force, Globalism, Homeland Security, Martial Law, Mexico, michael chertoff, Microsoft, NATO, New World Order, new zealand, North American Union, NORTHCOM, NSA, olympics, Oregon, Pennsylvania, Police State, SPP, State Sponsored Terrorism, Stephen Harper, United Kingdom, virginia, war games, War On Terror, world police force | Tags: Cisco Systems, Cyberstorm 2, Dow Chemical, McAfee, Operation Quick Resolve, TOPOFF 4, TOPOFF 5
TOPOFF 5 Announced
Vancouver 24
March 5, 2008
Could Canada’s Games be secured with help from Americans and Mexicans?
Canada, U.S. and Mexico are planning a massive joint military exercise in April 2009 “to focus on terrorist events that could affect [the] 2010 Olympics,” according to Public Safety Canada documents released to 2010 Watch via access to information.
The rehearsal, led by the U.S. Department of Homeland Security, is code-named TOPOFF 5. Canadian troops were among the 15,000 participants involved in last October’s TOPOFF 4 in Portland, Ore., Phoenix, Ariz. and Guam.
http://video.google.com/googleplayer.swf?docId=965078627199672535&hl=en
“Exercises provide unique training opportunities to strengthen our ability to deal with potential emergencies,” said Public Safety Minister Stockwell Day in an e-mail statement responding to 24 hours’ interview request. “They are important tools to strengthen Canada’s ability to deal with real incidents.”
An undated Public Safety Canada report said up to $22.8 million was needed to fund emergency management, counter-terrorism, cyber security and critical infrastructure protection exercises, “leading to a trilateral full-scale exercise prior to the Vancouver Olympic Games in 2010, as outlined under the Security and Prosperity Partnership.”
SPP was founded in 2005 to promote economic growth and enhanced security in North America.
“Does it mean that if the American forces are training with Canadian forces that they are going to be positioned here in Canada during the period of the Olympic Games?” said 2010 Watch’s Chris Shaw. “And, if so, under whose command?”
Washington Prepares for Cyber War Games
Cyber Storm II begins March 11th until the 14th, US, Canada, UK, Australia and New Zealand plan joint military exercise
Washington Post
March 7, 2008
The U.S. government will conduct a series of cyber war games throughout next week to test its ability to recover from and respond to digital attacks.
Code-named ‘Cyber Storm II,’ this is the largest-ever exercise designed to evaluate the mettle of information technology experts and incident response teams from 18 federal agencies, including the DHS, CIA, Department of Defense, FBI, and NSA, as well as officials from nine states, including Delaware, Pennsylvania and Virginia. In addition, more than 40 companies will be playing, including Cisco Systems, Dow Chemical, McAfee, and Microsoft.
http://www.venturacountystar.com/ne..ogy-war-game-tests-us-readiness/
NATO: Cyber Warfare Poses Great Threat
http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity
“Operation Quick Resolve”: National Guard holds surprise training drill
http://www.eyewitnessnewstv.com/G..p?S=7952938&nav=F2DO
eneral Warns Of Al-Qaeda Threat To U.S.
http://news.yahoo.com/s/ap/terror_th..3QSUec3jGs0NUE
Bush: America Still Not Safe From Terrorism
http://www.reuters.com/artic..idUSN0624857820080306?sp=true
March Madness: Homeland Security Issues Warning on Sports Arenas
http://www.abcnews.go.com/print?id=4387469
Pentagon To Gas Crystal City Residents
http://prisonplanet.com/articles/march2008/030308_crystal_city.htm
Filed under: 1984, Big Brother, biometrics, Child Abuse, Conditioning, Control Grid, Europe, microchip, Microsoft, ministry of justice, NSA, Police State, RFID, Surveillance, United Kingdom, Verichip
Doctor Alleges Plan To Microchip Babies
Agora Cosmopolitan
January 16, 2008
Regarding plans to microchip newborns, Dr. Kilde said the U.S. has been moving in this direction “in secrecy.”
She added that in Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection’s ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid-1980s. The technology is revealed in the 1972:47 Swedish state report, Statens Officiella Utradninger.
Are you prepared to live in a world in which every newborn baby is micro-chipped? And finally are you ready to have your every move tracked, recorded and placed in Big Brother’s data bank? According to the Finnish article, distributed to doctors and medical students, time is running out for changing the direction of military medicine and mind control technology, ensuring the future of human freedom.
“Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies,” wrote Dr. Kilde. “Guinea pigs in secret experiments have included prisoners, soldiers, mental patients,handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered “marginal” by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience.
“Today’s microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intelligence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The 20-billion-bit/second supercomputers at the U.S. National Security Agency (NSA) could now “see and hear” what soldiers experience in the battlefield with a remote monitoring system (RMS).
“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillimeters) is placed into optical nerve of the eye,”, Dr. Kilde indicates “it draws neuro-impulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuro-impulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. ”
“Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices, ” Dr. Kilde adds. “Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”
UK: Prisoners ‘to be chipped like dogs’
Hi-tech ‘satellite’ tagging planned in order to create more space in jails
Independent
January 13, 2008
Ministers are planning to implant “machine-readable” microchips under the skin of thousands of offenders as part of an expansion of the electronic tagging scheme that would create more space in British jails.
Amid concerns about the security of existing tagging systems and prison overcrowding, the Ministry of Justice is investigating the use of satellite and radio-wave technology to monitor criminals.
But, instead of being contained in bracelets worn around the ankle, the tiny chips would be surgically inserted under the skin of offenders in the community, to help enforce home curfews. The radio frequency identification (RFID) tags, as long as two grains of rice, are able to carry scanable personal information about individuals, including their identities, address and offending record.
The tags, labelled “spychips” by privacy campaigners, are already used around the world to keep track of dogs, cats, cattle and airport luggage, but there is no record of the technology being used to monitor offenders in the community. The chips are also being considered as a method of helping to keep order within prisons.
A senior Ministry of Justice official last night confirmed that the department hoped to go even further, by extending the geographical range of the internal chips through a link-up with satellite-tracking similar to the system used to trace stolen vehicles. “All the options are on the table, and this is one we would like to pursue,” the source added.
http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=59690
http://news.yahoo.com/s/ap/2008..VJJZVAZISeZf1hkPChk24cA
http://noworldsystem.com/2007..nt-to-microchip-guatemalans/
Filed under: 1st amendment, ABC, AOL, Big Brother, bill of rights, biometrics, Charles Gibson, CIA, cointelpro, Control Grid, Department of Defense, DHS, DoD, Drivers License, FAA, FBI, Homeland Security, Illegal Immigration, Immigration, ITAA, michael chertoff, Microsoft, national id, neocons, no-fly list, North American Union, Northrop-Grumman, Pentagon, Police State, Real ID, RFID, US Constitution, War On Terror
Real ID: From “No Fly” to “No Drive” Lists?
Kurt Nimmo
Truth News
January 13, 2008
http://www.youtube.com/watch?v=yH2WGhwoFFY
ABC breaks the ice for us: in the future, and not too far into it, the process of getting and renewing a driver’s license will become more difficult, stressful, and fraught with all manner of unnecessary nonsense supposedly designed to protect us from terrorists, or rather CIA patsies paraded about to frighten us into submission, and as well prevent illegals from taking to the roads, never mind Alaska, Connecticut, Idaho, Louisiana, Montana, Nevada, New Mexico, North Carolina, Ohio, Rhode Island, Tennessee, Utah, Washington and West Virginia allow illegals to hold a license, thus demonstrating the above is little more than a threadbare excuse.
Of course, when the rubber meets the road, we discern the real reason — a national ID, complete with RFID and possibly biometrics, is all about easing us into the control grid.
According to apparatchik Michael Chertoff and the commissariat of Homeland Security, the whole affair is a matter of national security. “We are now over six years from 9/11,” Chertoff impatiently declared, “we live every day with the problems of false identification. Simply kicking this problem down the road year after year after year for further discussion, further debate and analysis is a time-tested Washington way of smothering any proposal with process.”
In other words, never mind that most people oppose Real ID and civil libertarians warn of vexing abuse, Chertoff and the neocons are itching to get us all in lumbering databases, the next step in a plan that will ultimately result in the chipping of the population at large.
“I think the time has come to bite the bullet,” Chertoff continued, “and get the kind of secure identification I am convinced the American public wants to have,” or rather the government tells them they must have, as most people hate the idea and eighteen states have passed legislation rejecting the law and Congress has refused to put any money into implementing it.
But never mind. It is a win-win situation for AOL, Microsoft, Verizon and Yahoo, all who stand to clean up if Chertoff manages to force his card on Americans at large. “The Information Technology Association of America (ITAA) sent a letter to Congress this week begging for more federal funding for Real ID,” Privacy Digest noted last October. In addition to the above corporate culprits, we can add Digimarc and Northrop Grumman, “companies that specialize in creating high-tech ID cards, as well as Choicepoint and LexisNexis, data brokers that make their money selling personal information about you to advertisers and the government. These companies stand to make millions in contracts from states who are struggling with a federal mandate to overhaul their licensing systems and share more data by the May 2008 deadline,” a date right around the corner, thus explaining Chertoff’s impatience.
“Real ID is so unpopular because in addition to being a $23 billion unfunded mandate, it will build a vast national database of personal information, expose us to a greater risk of identity theft, and move us ever closer to a total surveillance society.’
It may also be a way to keep “terrorists” off the roadways — not the Muslim cave dwelling brand of terrorist, mind you, but the kind that exercises his or her right to petition the government under that rusty old anachronism, the First Amendment to the Bill of Rights of the Constitution.
As we know, thousands of Americans are on the Federal Aviation Administration’s No-Fly List and the FBI’s Terrorist Screening Center has compiled a terrorist watch list of over 700,000 people. Moreover, as Dave Lindorff writes, the government is in the business of passing this information out to private companies. “The Wall Street Journal reported that the FBI made its list of people with even remote links to terrorism — having associated, perhaps inadvertently, with a terror suspect, for example — available to a wide range of private companies, from banks and rental-car companies to casinos.”
And who exactly are these primary terrorists, the ones you don’t want to associate with, that is if you ever want to fly again? They are “law-abiding Americans” who were detained and questioned — we used to call this harassment — “based on their political viewpoints,” according to Nancy Chang, a senior litigation attorney at the Center for Constitutional Rights. “I think what they are doing is harassing people who are opposing the war and publicly speaking out against administration policy,” John Dear, a Jesuit priest and member of the Catholic peace group Pax Christi, told Lindorff.
http://video.google.com/videoplay?docid=99882080920493477&hl=en
Back in 2003, we learned that the FBI “collected extensive information on the tactics, training and organization of antiwar demonstrators and … advised local law enforcement officials to report any suspicious activity at protests to its counterterrorism squads,” the New York Times reported. Of course, this is simply a continuation of the FBI’s COINTELPRO, initiated in the 1960s to “neutralize” the opposition — i.e., render activists not only politically impotent, but often wreck their lives as well.
In 2006, we discovered that COINTELPRO didn’t go away, as the official history would have it, but lives on to this day at the Pentagon. “An antiterrorist database used by the Defense Department in an effort to prevent attacks against military installations included intelligence tips about antiwar planning meetings held at churches, libraries, college campuses and other locations,” reported the New York Times. The database, known as Talon, “showed that the military used a variety of sources to collect intelligence leads on antiwar protests, including an agent in the Department of Homeland Security, Google searches on the Internet and e-mail messages forwarded by apparent informants with ties to protest groups.”
In short, the FBI and the Pentagon are still in the business of compiling lists and checking them twice, and many if not most of these people end up grounded, as noted above.
Now we have Chertoff and ABC telling us the same rules may soon apply to driving a car. As Chertoff told ABC, the Real ID is about preventing “terrorists” from driving — with illegal immigration tacked on as a selling point — and, if the behavior of the FBI and the Pentagon are any indicator, the real terrorists are not Muslim guys who were trained on U.S. military bases and had a fondness for cruising topless bars, but are antiwar activists and other troublemakers.
Soon enough, many of us – those who believe the Constitution says what it means — may be reduced to walking to work and the grocery store… that is until a Real ID card will be required to hold job or buy a loaf of bread.
http://jbs.org/node/6815
Homeland Security May Curtail Freedoms of Citizens of 17 States that Reject REAL ID
http://www.azstarnet.com/dailystar/220232
U.S. Issues National ID Standards, Setting Stage for a Showdown
http://www.nytimes.com/2008/0..&ref=us&oref=slogin&oref=slogin
Another demand for ID poses danger to free society
http://www.jsonline.com/story/index.aspx?id=706205
Born After 1964 You Will Need Real ID
http://noworldsystem.com/200..r-1964-you-will-need-real-id/
Filed under: AOL, Big Brother, biometrics, China, civil rights, Control Grid, FCC, George Bush, Internet 2, Microsoft, net neutrality, North American Union, Real ID, Richard Clarke, Surveillance
Richard Clarke Former Security Czar Calls For Closed Internet
UK Register
October 3, 2007
Richard Clarke, the man who served President Bush as a special adviser for cyber security, has a five-point plan for saving the internet.
Speaking at a Santa Clara University conference dedicated to “trust online,” Clarke called the net “a place of chaos in many ways, a place of crime in many ways,” but laid out several means of righting the ship, including biometric IDs, government regulation, and an industry wide standard for secure software. He even embraces the idea of a closed internet – which seems to have sparked a death threat from net pioneer Vint Cerf.
“A lot of these ideas go against the grain. A lot of these ideas are ones people have already objected to – because of certain shibboleths, because of certain belief systems, because of certain idealogical differences,” Clarke said. “But if we’re going to create trust in cyberspace, we have to overcome some of those shibboleths, overcome some of those ideological differences, and look anew at these ideas.”
According to Clarke – who was also a special assistant to the President for global affairs and national coordinator for security and counter-terrorism – about 35 per cent of all U.S. citizens would rather shoot themselves than carry a national ID card. But he thinks they’re being silly. He believes biometric IDs are an essential means of fighting online crime.
“One thing you could do with a biometric ID card – if you wanted to – is prove your identity online,” he said, as if taunting his critics.
Yes, he realizes that internet mavens value online anonymity. But he insists this has nothing to do with biometric internet IDs. “One of ideological underpinnings of the internet is that we’re anonymous,” he said. “Well, guess what? We’re not anonymous. Amazon and DoubleClick and all those other companies already know everything about what you’re doing online.” ID cards don’t eliminate anonymity, he explained, because anonymity is already gone. Then he added that Bill Gates agrees with him.
Next, Clarke called for more government oversight of the net. According to his rough calculations, 75 per cent of all U.S. citizens are against government regulation of any kind. But he thinks they’re being silly too. “You don’t want government regulation? Then just let your kids eat all that lead off their toys.”
In short, he believes the Federal Communications Commission (FCC) should force ISPs to crack down on cyber-crime. “[The FCC] could, for example, say to all the ISPs, ‘You will do the following things to reduce fraud, bot nets, malicious activity, etc.”
Isn’t the government one of the problems where online privacy is concerned? It is, as Clarke pointed out. He also called for a nonpartisan organization dedicated to fighting abuses of government power. “What if we had a champion in the government who we trusted on privacy rights and civil liberties? What if we had a government advocate with real power to ensure that the government doesn’t violate privacy rights.”
That’s three points from the five-point plan. Two more to go.
Number four: A secure software standard. “We should look, as an industry, at improving the quality of secure code, so that we don’t need to issue software patches, so there aren’t trap doors – intentional or otherwise,” he said. “This is not a revolutionary idea. We put this in place a long time ago for electrical appliances.”
This is Clarke’s least controversial notion, but you have to wonder how effective it can be. Removing all bugs from electrical equipment is one thing. Removing them from software code – some of the most complex stuff ever invented – is another.
In discussing secure software standards, Clarke slipped in another plug for Microsoft. “This is an idea Microsoft has already championed,” he said. And then he said it again. Bill and gang sponsored the conference.
And, yes, Clarke’s fifth and final idea is a less than open internet. “Another idea that’s already been rejected that I think we should look at again is the idea of a closed internet,” Clarke said. “Why should the part of the internet that’s connected to the power grid be open? Why should that part of the internet that runs nuclear laboratories be open? Why shouldn’t there be a closed internet? There are already relatively closed internets – and now we need to think seriously about expanding them.”
Several years ago, when Clarke suggested the idea to Vint Cerf, the internet founding father had a fit. “[He] implied he was putting together a firing squad to take me out,” Clarke said.
AOL, Microsoft and Yahoo Pushing For Real ID
http://www.privacydigest.com/2007/10/….and+yahoo+do
What is the ‘North American Union’?
Microsoft Explores Biometrics For Targeting Ads
Information Week
August 3, 2007
In the film version of Minority Report, a personalized ad that knows about past purchases greets a character as he enters the Gap. Meanwhile, American Express ads tell Tom Cruise’s own character that he looks like he needs an escape as he’s chased by authorities. Now Microsoft has filed for a patent that could eventually help make these advertising scenarios come true.
Microsoft has been investing heavily in advertising, including a $6 billion acquisition of aQuantive that should close this quarter, a new top ad exec at the company, and a new applied search and advertising research group.
“Techniques for the targeting of advertisements are meager,” the patent application said. “Some industry experts question how long the old world approach can last before the entire system becomes impossible to justify.”
The new Microsoft system, described in the patent application published last week, would be able to determine the identity of someone watching a display and deliver personalized ads to that person. Identification could come from biometric sensors, cameras, or more traditional login methods. A computer would then evaluate information that has been tracked about the person and the content and present a personally relevant advertisement.
The information being tracked could be very extensive, including but not limited to personal interests and hobbies, sex, age, location, profession, subscriptions, group membership, ethnicity, marital status, height, status in the family (i.e., parent or child), the viewer’s address book, calendar, e-mail inbox, notes, purchasing history, and advertising preferences.
So, for example, the system could know that a man watching TV has a wife whose birthday is tomorrow, that the man has bought flowers for her birthday before, and what her name is. The targeted advertisement might create a virtual, photorealistic bouquet based on preferences and ask the viewer if he’d like to buy this bouquet for Julie’s birthday tomorrow.
Such a system is bound to create privacy concerns, and Microsoft takes that into consideration, unlike in another recently published patent application regarding personalized ads for computer users. The new application mostly covers home devices, like cell phones, smart phones, PDAs, computer monitors, televisions, and projections, and does so with security of personal information in mind. “The tracking system may be located inside the person’s home or at some other trusted location, so that the personal information stored therein is protected,” it said. The system could also be tweaked so kids don’t receive targeted ads.
There also seems to be a limit on how much information would ultimately get back to advertisers. The personalization would take place on the local system, rather than with the advertiser. “While the tracking system may notify an advertiser of the opportunity and request advertiser data, the advertiser is not aware to which person the advertisement is going to be presented, and therefore cannot personalize the advertisement at its end,” the application reads.
http://www.youtube.com/watch?v=nQbVD5hlddk
Related News:
Pentagon To Implant Microchips In Soldiers
http://pressesc.com/news/8….microchips-soldiers-brains
Oregon To Use Face Recognition Software
http://seattletimes.nwsou….ces23m&date=20070723
The Police State Takeover Of Schools
http://www.theregister.co.uk/2007/07/23/biometrics_vein_recognition/
Microchips mulled for HIV carriers in Indonesia’s Papua
Hitachi Goes Global With Vein Recognition
New Research Into Public Surveillance Methods
Children as young as five to be fingerprinted in schools
Biometrics to be Required When Leaving U.S.
American Medical Association Backs Plan To Microchip Patients
Fingerprinting and Eye Scans for 5 Year Olds
The complete CNBC Squawkbox video on Verichip
New Bill May Ban Forced ID Implants
Tracking The Troops With Microchips
Minnesota turns to RFID to monitor inmates
Uproar Over Verichip Implants
France to Push Microchip Implants on Clubbers
Bill O’ Reilly and Roger Ebert Discuss Microchips
Cop to CNN: “More Cops Should Be Implanted With Microchips”
Microchips in Fish
G8 Green Light For Global Biometric Database
House Rejects Microchip Implants for Violent Criminals
Iris scan is quick way to ID kids
Bio-chips for workers at airports
Media Pushes for Children to be Microchipped