tag:blogger.com,1999:blog-79631727167394853562024-02-19T05:21:15.443-05:00Who's Watching Us?<p>RFID & Privacy
<p>Who's Watching Us? Who's tracking our lives at every possible second? How are they doing it? Most importantly, why?
<p>What sort of future is rapidly upon us? What are our rights and how are they standing up to this 'Brave New World' we find ourselves becoming a part of?DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.comBlogger25125tag:blogger.com,1999:blog-7963172716739485356.post-54412399373006980152009-02-09T21:23:00.004-05:002009-02-09T21:28:36.247-05:00The New Thought Police:<div id="d_feature_copy"> <h1><span style="font-size:100%;">The New Thought Police:<br />The NSA Wants to Know How You Think—<br /><span style="color: rgb(153, 0, 0);">Maybe Even What You Think</span></span><br /><span class="author"><br /></span></h1> <p>The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking.</p> <p>With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected—through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records—it may one day be possible to know not just where people are and what they are doing, but what and how they think.</p> <p>The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability.</p><p><br /></p><a href="http://www.pbs.org/wgbh/nova/spyfactory/poli-01.html" target="newWindow" onclick="cfl_window('poli-01.html',620,460); return false"> <img src="http://www.pbs.org/wgbh/nova/spyfactory/images/poli-01.jpg" alt="The Spy Factory" width="198" height="198" /> </a> <p> The National Security Agency's eavesdropping on phone calls, e-mails, and other communications skyrocketed after 9/11. But that was only the beginning of its high-tech invasiveness, as Bamford reports. Above, NSA headquarters in Fort Meade, Maryland. </p> <h2>Getting Aquaint</h2> <p>Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. Headquartered in Room 12A69 in the NSA's Research and Engineering Building at 1 National Business Park, ARDA was set up by the agency to serve as a sort of intelligence community DARPA, the place where former Reagan national security advisor John Poindexter's infamous Total Information Awareness project was born. [Editor's note: TIA was a short-lived project founded in 2002 to apply information technology to counter terrorist and other threats to national security.] Later named the Disruptive Technology Office, ARDA has now morphed into the Intelligence Advanced Research Projects Activity (IARPA).</p><a href="http://www.pbs.org/wgbh/nova/spyfactory/poli-02.html" target="newWindow" onclick="cfl_window('poli-02.html',620,460); return false"> </a><div style="text-align: center;"><a href="http://www.pbs.org/wgbh/nova/spyfactory/poli-02.html" target="newWindow" onclick="cfl_window('poli-02.html',620,460); return false"><img src="http://www.pbs.org/wgbh/nova/spyfactory/images/poli-02.jpg" alt="The Spy Factory" width="198" height="211" /> </a></div> <p> Bamford calls the widespread (and warrantless) monitoring of average citizens' communications overseen by the NSA "the surveillance-industrial complex." </p><p>A sort of national laboratory for eavesdropping and other spycraft, IARPA will move into its new 120,000-square-foot home in 2009. The building will be part of the new M Square Research Park in College Park, Maryland. A mammoth two million-square-foot, 128-acre complex, it is operated in collaboration with the University of Maryland. "Their budget is classified, but I understand it's very well funded," said Brian Darmody, the University of Maryland's assistant vice president of research and economic development, referring to IARPA. "They'll be in their own building here, and they're going to grow. Their mission is expanding."</p> <p>If IARPA is the spy world's DARPA, Aquaint may be the reincarnation of Poindexter's TIA. After a briefing by NSA Director Michael Hayden, Vice President Dick Cheney, and CIA Director George Tenet of some of the NSA's data mining programs in July 2003, Senator Jay Rockefeller IV, the vice chairman of the Senate Intelligence Committee, wrote a concerned letter to Cheney. "As I reflected on the meeting today," he said, "John Poindexter's TIA project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance."</p> <h2>Building "Hal"</h2> <p>The original goal of Aquaint, which dates back to the 1990s, was simply to develop a sophisticated method of picking the right needles out of a vast haystack of information and coming up with the answer to a question. As with TIA, many universities were invited to contribute brainpower to the project. But in the aftermath of the attacks on 9/11, with the creation of the NSA's secret warrantless eavesdropping program and the buildup of massive databases, the project began taking on a more urgent tone.</p> <p class="callout">"Think of <i>2001: A Space Odyssey</i> and the most memorable character, HAL 9000. We are building HAL."</p> <p>In a 2004 pilot project, a mass of data was gathered from news stories taken from the <i>New York Times</i>, the AP news wire, and the English portion of the Chinese Xinhua news wire covering 1998 to 2000. Then, 13 U.S. military intelligence analysts searched the data and came up with a number of scenarios based on the material. Finally, using those scenarios, an NSA analyst developed 50 topics, and in each of those topics created a series of questions for Aquaint's computerized brain to answer. "Will the Japanese use force to defend the Senkakus?" was one. "What types of disputes or conflict between the PLA [People's Liberation Army] and Hong Kong residents have been reported?" was another. And "Who were the participants in this spy ring, and how are they related to each other?" was a third. Since then, the NSA has attempted to build both on the complexity of the system—more essay-like answers rather than yes or no—and on attacking greater volumes of data.</p> <p>"The technology behaves like a robot, understanding and answering complex questions," said a former Aquaint researcher. "Think of <i>2001: A Space Odyssey</i> and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL." A naturalized U.S. citizen who received her Ph.D. from Columbia, the researcher worked on the program for several years but eventually left due to moral concerns. "The system can answer the question, 'What does X think about Y?'" she said. "Working for the government is great, but I don't like looking into other people's secrets. I am interested in helping people and helping physicians and patients for the quality of people's lives." The researcher now focuses on developing similar search techniques for the medical community.</p> <h2>Thought policeman</h2> <p>A supersmart search engine, capable of answering complex questions such as "What were the major issues in the last 10 presidential elections?" would be very useful for the public. But that same capability in the hands of an agency like the NSA—absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans—could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said Aquaint project leader John Prange, in charge of information exploitation for IARPA.</p> <p>Once up and running, the database of old newspapers could quickly be expanded to include an inland sea of personal information scooped up by the agency's warrantless data suction hoses. Unregulated, they could ask it to determine which Americans might likely pose a security risk—or have sympathies toward a particular cause, such as the antiwar movement, as was done during the 1960s and 1970s. The Aquaint robospy might then base its decision on the type of books a person purchased online, or chat room talk, or websites visited—or a similar combination of data. Such a system would have an enormous chilling effect on everyone's everyday activities—what will the Aquaint computer think if I buy this book, or go to that website, or make this comment? Will I be suspected of being a terrorist or a spy or a subversive?</p> <h2>Controlling brain waves</h2> <p>Collecting information, however, has always been far less of a problem for the NSA than understanding it, and that means knowing the language. To expand its linguistic capabilities, the agency established another new organization, the Center for Advanced Study of Language (CASL), and housed it in a building near IARPA at the M Square Research Park. But far from simply learning the meaning of foreign words, CASL, like Aquaint, attempts to find ways to get into someone's mind and understand what he or she is thinking.</p> <p>One area of study is to attempt to determine if people are lying simply by watching their behavior and listening to them speak. According to one CASL document, "Many deception cues are difficult to identify, particularly when they are subtle, such as changes in verb tense or extremely brief facial expressions. CASL researchers are studying these cues in detail with advanced measurement and statistical analysis techniques in order to recommend ways to identify deceptive cue combinations."</p> <p class="callout">Like something out of a B-grade sci-fi movie, CASL is even training employees to control their own brain waves.</p> <p>Another area of focus explores the "growing need to work with foreign text that is incomplete," such as partly deciphered messages or a corrupted hard drive or the intercept of only one side of a conversation. The center is thus attempting to find ways to prod the agency's cipher-brains to fill in the missing blanks. "In response," says the report, "CASL's cognitive neuroscience team has been studying the cognitive basis of working memory's capacity for filling in incomplete areas of text. They have made significant headway in this research by using a powerful high-density electroencephalogram (EEG) machine acquired in 2006." The effort is apparently directed at discovering what parts of the brain are used when very good cryptanalysts are able to guess correctly the missing words and phrases in a message.</p> <p>Like something out of a B-grade sci-fi movie, CASL is even trying to turn dull minds into creative geniuses by training employees to control their own brain waves: "The cognitive neuroscience team has also been researching divergent thinking: creative, innovative and flexible thinking valuable for language work. They are exploring ways to improve divergent thinking using the EEG and neurobiological feedback. A change in brain-wave activity is believed to be critical for generating creative ideas, so the team trains its subjects to change their brain-wave activity."<img class="incopy" src="http://www.pbs.org/wgbh/nova/images02/nav_end.gif" alt="" width="7" border="0" height="7" /></p><div style="text-align: center;"><a href="http://www.pbs.org/wgbh/nova/spyfactory/poli-05.html" target="newWindow" onclick="cfl_window('poli-05.html',620,460); return false"> <img style="width: 286px; height: 201px;" src="http://www.pbs.org/wgbh/nova/spyfactory/images/poli-05.jpg" alt="The Spy Factory" /> </a></div><p> </p><p style="text-align: center;"> Ever watching and listening: a control room at NSA headquarters. </p><p><br /></p> </div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-91527892358657470612009-02-09T21:20:00.001-05:002009-02-09T21:22:44.921-05:00Big Brother Is Watching Everything That You Do<h2><a href="http://thefinalhour.blogspot.com/2009/02/big-brother-is-watching-everything-that.html">Big Brother Is Watching Everything That You Do</a></h2> <div class="date"> <span class="author"> </span><span class="clock"></span><span class="clock">Sunday, February 08, 2009</span> </div> <p style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwolBqcxD_JJpu7AgrgVtUKaKMtqo1MNQktCRFOqacqXsC1DWaLS7g8GOjZHNaycbweS9poBI_g-56e3znO9X7QhUQXmZ_f9h3kmdakb0lbKshBtoMTzl0xVbCQbJKoTx-A6X8jEfTTmv_/s1600-h/Big+Brother+Is+Watching+You.jpg"><img id="BLOGGER_PHOTO_ID_5300588061998771026" style="margin: 0px 10px 10px 0px; float: left; width: 320px; height: 213px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwolBqcxD_JJpu7AgrgVtUKaKMtqo1MNQktCRFOqacqXsC1DWaLS7g8GOjZHNaycbweS9poBI_g-56e3znO9X7QhUQXmZ_f9h3kmdakb0lbKshBtoMTzl0xVbCQbJKoTx-A6X8jEfTTmv_/s320/Big+Brother+Is+Watching+You.jpg" border="0" /></a><br /></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><p>In the previous article entitled "<a href="http://thefinalhour.blogspot.com/2009/01/nsas-black-widow-is-watching-all-your.html">The NSA's Black Widow Is Watching ALL Your Calls & Emails</a>", we discussed how the NSA literally has a supercomputer that scans millions of calls, emails and other electronic communications each day.<br /><br />But that is yesterday's news.<br /><br />Now <a href="http://www.pbs.org/wgbh/nova/spyfactory/police.html">the NSA is creating an artificial intelligence system called "Aquaint"</a> that will literally pull information from thousands of databases to figure out not only what you are doing, but also what you are <strong>thinking</strong>.<br /><br />Aquaint ("Advanced QUestion Answering for INTelligence") is being designed to pull information from your phone calls, credit card receipts, social networks such as Facebook and MySpace, GPS devices, cell phones, Google searches, Amazon book purchases and even E-Z Pass toll records to give users of the system information on where you are, what you are doing and what you are thinking.<br /><br />Oh, you didn't think that the government could do that?<br /><br />Oh, you didn't think that the government was ALLOWED to do that?<br /><br />Guess again.<br /><br />Welcome to the 21st century - the century of Big Brother.<br /><br />Acquaint is so incredibly intrusive <a href="http://www.pbs.org/wgbh/nova/spyfactory/police.html">that at least one researcher has left the project</a> because of concerns about what it is becoming.<br /><br />Imagine what a technology like this could mean if it fell into the wrong hands.<br /><br />For some time we have been saying that we are nearing the end of the "open society".<br /><br />Every day we sink deeper towards a scientific technocracy where "Big Brother" will rule all, but people do not seem to care.<br /><br />Did you know that there is a new Google application called Google Latitude that <a href="http://news.cnet.com/8301-1035_3-10155946-94.html?tag=TOCmoreStories.0">you can use to track your friends through their cell phones</a> wherever they go?<br /><br />So now you can be "Big Brother" too!<br /><br />But of course your friends can track and trace you too.<br /><br />Isn't that fun?<br /><br />The reality is that Google <a href="http://technology.timesonline.co.uk/tol/news/tech_and_web/article5678743.ece">knows way more about you than you would dare to think</a>.<br /><br />Someday technologies such as this will not only be able to determine what you are doing, saying and thinking, but they will also be able to control you as well.<br /><br />The reality is that we are moving into times that science fiction writers never even dreamed of.<br /><br />Are you ready?</p><p><span style="font-size:78%;"><span class="author">Posted by <span class="fn">Shattered Paradigm</span> </span><span class="clock"> On Sunday, February 08, 2009</span></span> </p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com2tag:blogger.com,1999:blog-7963172716739485356.post-84364646530598379022009-02-03T18:47:00.003-05:002009-02-03T18:51:52.428-05:00Bill Would Expand Homeland Security's Collection Of Biometric Information<style type="text/css"> .title{ font-family: Arial; color: #000033; font-size: 12; font-weight: bold; font-style: ; text-decoration: ; } .textsmall{ font-family: Arial; color: #000000; font-size: 12; } a.titlelink:link { color: #0000FF; } a.titlelink:active { color: #0000FF; } a.titlelink:visited { color: #0000FF; } a.titlelink:hover { color: #9999CC; } </style> <table width="98%" align="center" border="0"> <tbody><tr><td align="right"> <input value=" Print " onclick="window.print();return false;" type="button"> <input value=" Close " onclick="window.close()" type="button"> </td></tr> </tbody></table> <hr size="1" width="98%" color="#000000"> <table width="98%" align="center" border="0" cellpadding="5" cellspacing="0"> <tbody><tr><td class="title">Bill Would Expand Homeland Security's Collection Of Biometric Information</td></tr> <tr><td class="textsmall">Published on 02-02-2009</td></tr> <tr><td><span style="font-size:130%;"><br /></span><p><span style="font-size:130%;"><img style="width: 200px; height: 200px;" src="http://www.fi-logic.com/Images/Biometric.jpg" alt="" vspace="10" align="right" hspace="10" /></span><span style="font-size:100%;"><a href="http://www.govtrack.us/congress/billtext.xpd?bill=h111-752">A new bill</a> proposed in the U.S. House of Representatives would require the Secretary of Homeland Security to conduct a program in the maritime environment for the mobile biometric identification of suspected individuals including terrorists. The federal government has been using the excuse of fighting terrorists to incrementally expand the usage of biometric identification for quite awhile now, and this is just another step into expanding the adoption of this technology. It is not a stretch to believe that if something like this is implemented for the purposes of fighting terrorists out in the oceans, that eventually it would be utilized inside the United States for domestic policing purposes. After all, former <a href="http://www.wcax.com/Global/story.asp?S=8117897&nav=4QcS">Secretary of Homeland Security Michael Chertoff thought it would be a great idea to setup an internal checkpoint within the state of Vermont</a> to search for drug dealers and terrorists. <a href="http://www.dhs.gov/xnews/releases/pr_1232056782879.shtm">Not to mention they’ve already setup the US-VISIT program which mandates that many non-U.S. citizens visiting the United States submit to biometric identification in order to gain entry</a>. </span></p> <p><span style="font-size:100%;">Below is the entire text of HR 752 which would require the Department of Homeland Security to expand their biometric identification program.</span></p> <p><span style="font-size:100%;"><i>To require the Secretary of Homeland Security to conduct a program in the maritime environment for the mobile biometric identification of suspected individuals, including terrorists, to enhance border security.</i></span></p> <p style="margin-left: 0.5in;"><span style="font-size:100%;"><em><span title="Collapse this section">Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,</span></em></span></p> <p><span style="font-size:100%;"><b><i><span title="Collapse this section">SECTION 1. MARITIME BIOMETRIC IDENTIFICATION.</span></i></b></span></p> <p style="margin-left: 0.5in;"><span style="font-size:100%;"><i><span title="Collapse this section">(a) In General- Not later than one year after the date of the enactment of this Act, the Secretary of Homeland Security, acting through the Commandant of the Coast Guard, shall conduct, in the maritime environment, a program for the mobile biometric identification of suspected individuals, including terrorists, to enhance border security and for other purposes.</span></i></span></p> <p style="margin-left: 0.5in;"><span style="font-size:100%;"><i><span title="Collapse this section">(b) Requirements- The Secretary shall ensure the program described in subsection (a) is coordinated with other biometric identification programs within the Department of Homeland Security.</span></i></span></p> <p style="margin-left: 0.5in;"><span style="font-size:100%;"><i><span title="Collapse this section">(c) Cost Analysis- Not later than 90 days after the date of the enactment of this Act, the Secretary shall submit to the Committees on Appropriations and Homeland Security of the House of Representatives and the Committees on Appropriations and Homeland Security and Governmental Affairs of the Senate an analysis of the cost of expanding the Coast Guard’s biometric identification capabilities for use by the Coast Guard’s Deployable Operations Group, cutters, stations, and other deployable maritime teams considered appropriate by the Secretary, and any other appropriate Department of Homeland Security maritime vessels and units. The analysis may include a tiered plan for the deployment of the program described in subsection (a) that gives priority to vessels and units more likely to encounter individuals suspected of making unlawful border crossings through the maritime environment.</span></i></span></p> <p style="margin-left: 0.5in;"><span style="font-size:100%;"><i><span title="Collapse this section">(d) Definition- For the purposes of this section, the term ‘biometric identification’ means the use of fingerprint and digital photography images.</span></i></span></p> <p><span style="font-size:100%;">There is no question that the Department of Homeland Security is attempting to put as much biometric information from people into computer databases. This bill would expand their ability to obtain additional biometric information. Most people won’t object to this since it the excuse to implement this expansion has to do with border security. None the less, it is clear that this is yet another case of the federal government attempting to utilize more and more of this technology that could ultimately be used to enslave humanity using the phony terror war hoax as the pretext.</span></p><p><span style="font-size:100%;"><b>Source: <a href="http://www.roguegovernment.com/">www.roguegovernment.com</a></b></span> </p> <p><span style="font-size:100%;"><b>By - Lee Rogers</b></span> </p> <div><span style="font-size:130%;"> </span></div></td></tr> </tbody></table>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-30118858802122268472009-02-02T07:15:00.004-05:002009-02-02T07:17:58.169-05:00New Bill Will Turn Old Military Bases Into FEMA Camps<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLIzlQns5ukTYrBOQjCMb8ZW1MESHtRjh1gucRiNyV82Gc663HganwGMdYuqOMhAPnNZGs11KnIlvkBCByUmeJh_8oMmoYAw1bDeiQmWotkaj2UxDKJU2rg8RrLiMgKyzTgOidAqjwuzs/s1600-h/femacamps3.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLIzlQns5ukTYrBOQjCMb8ZW1MESHtRjh1gucRiNyV82Gc663HganwGMdYuqOMhAPnNZGs11KnIlvkBCByUmeJh_8oMmoYAw1bDeiQmWotkaj2UxDKJU2rg8RrLiMgKyzTgOidAqjwuzs/s320/femacamps3.jpg" alt="" id="BLOGGER_PHOTO_ID_5298172919700959330" border="0" /></a><br />On January 22nd, Representative Alcee Hastings [D-FL] introduced a new bill in the U.S. House of Representatives called the National Emergency Centers Act (also known as HR 645).<br /><br />If Congress passes this bill, the Department of Homeland Security will be REQUIRED to establish national emergency centers (FEMA camps) on closed military bases.<br /><br />For years, mainstream apologists have tried to deny that the government was putting together a network of FEMA detention camps across the United States. But now the wording of this new law would require that closed military bases be converted into Homeland Security "emergency centers". Just check out this language from the bill: "Wherever possible, the Secretary of Homeland Security, in consultation with the Secretary of Defense, shall designate a closed military installation as a site for a national emergency center."<br /><br />You can see the entire text of this new bill here:<br /><br /><a href="http://www.govtrack.us/congress/billtext.xpd?bill=h111-645">http://www.govtrack.us/congress/billtext.xpd?bill=h111-645</a><br /><br />Let's take a look at some of the specific language in this bill.....<br /><br /><strong>"In accordance with the requirements of this Act, the Secretary of Homeland Security shall establish not fewer than 6 national emergency centers on military installations."</strong><br /><br />This law would require that AT LEAST 6 FEMA camps be established on military installations around the United States. But it does not set a maximum. So the number of FEMA camps established under this law could be 6 or it could be 60.<br /><br /><strong>"(4) to meet other appropriate needs, as determined by the Secretary of Homeland Security."</strong><br /><br />This language gives the Secretary of Homeland Security the authority to use these FEMA camps for any purpose that he or she wishes. That is a truly sobering thought.<br /><br /><strong>".....capable of meeting for an extended period of time the housing, health, transportation, education, public works, humanitarian and other transition needs of a large number of individuals affected by an emergency or major disaster"</strong><br /><br />Note that the law would require that these FEMA camps be able to house (or imprison?) large populations for an extended period of time. There camps are not just being set up as command and control centers - they are being designed to hold "a large number of individuals".<br /><br /><strong>".....capable of hosting the infrastructure necessary to rapidly adjust to temporary housing"</strong><br /><p>Once again we see that these FEMA camps specifically have the purpose of "housing" people. </p><p><strong>(c) Location of National Emergency Centers- There shall be established not fewer than one national emergency center in each of the following areas:<br /><br />(1) The area consisting of Federal Emergency Management Agency Regions I, II, and III.<br /><br />(2) The area consisting of Federal Emergency Management Agency Region IV.<br /><br />(3) The area consisting of Federal Emergency Management Agency Regions V and VII.<br /><br />(4) The area consisting of Federal Emergency Management Agency Region VI.<br /><br />(5) The area consisting of Federal Emergency Management Agency Regions VIII and X.<br /><br />(6) The area consisting of Federal Emergency Management Agency Region IX.</strong> </p><p>Please note that the law REQUIRES that at least one of these FEMA camps be established in specific FEMA regions. </p><p>Which FEMA region do YOU live in?<br /><br /><strong>If the Secretaries of Homeland Security and Defense jointly determine that there is not a sufficient number of closed military installations that meet the requirements of subsections (b) and (c), the Secretaries shall jointly designate portions of existing military installations other than closed military installations as national emergency centers.</strong><br /><br />This part of the bill actually requires the use of an active military base for a FEMA camp if there are not enough closed military bases to do the job.<br /><br />Where do you think the FEMA camp closest to your house will be established?</p><p>Are you ready to go to a "national emergency center" when the government declares martial law?</p><p>What will your response be if they come to put you on a train that will take you and your family to one of these camps?</p><p>But you know what one of the saddest things is?</p><p>The machinery of martial law is being put into place, and the American people are hardly uttering a peep in protest.</p><p><span style="font-size:85%;">[TheFinalHour]</span><br /></p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com1tag:blogger.com,1999:blog-7963172716739485356.post-32213691167415943762009-02-02T07:05:00.001-05:002009-02-02T07:07:41.461-05:00The NSA's Black Widow Is Watching ALL Your Calls & Emails<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoZmbKUMRnHTA7bpEQxMa9Em2ws0u_bk4f8v3_acW82JY-rq-6et87lUH4KKc3mb1gbZYk81op1m_cRV4T7VP7pTLbY9CT1pk7SMXL769cJ2EMdNoj0TH4enpKIXroofArzhDPR9yGUWk/s1600-h/sat3.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 212px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoZmbKUMRnHTA7bpEQxMa9Em2ws0u_bk4f8v3_acW82JY-rq-6et87lUH4KKc3mb1gbZYk81op1m_cRV4T7VP7pTLbY9CT1pk7SMXL769cJ2EMdNoj0TH4enpKIXroofArzhDPR9yGUWk/s320/sat3.jpg" alt="" id="BLOGGER_PHOTO_ID_5298170345714441906" border="0" /></a><br />The NSA has a massive supercomputer called "The Black Widow" that watches millions of domestic and international phone calls and emails every single day. It is watching your electronic communications constantly and it may be aware that you are reading this article right now. <p>That sounds like a plot from a Bourne movie doesn't it?</p><p>But it's not.</p><p>It's real.</p><p>On October 26th, the Baltimore Sun's national security correspondent, David Wood <a href="http://www.baltimoresun.com/entertainment/booksmags/bal-al.bk.review26oct26,0,7827877.story">wrote the following</a> about the constant spying the NSA is doing: "The NSA's colossal Cray supercomputer, code-named the 'Black Widow,' scans millions of domestic and international phone calls and e-mails every hour. . . . The Black Widow, performing hundreds of trillions of calculations per second, searches through and reassembles key words and patterns, across many languages."</p><p>Perhaps you were still under the illusion that your phone calls and emails were private.</p><p>Perhaps it horrifies you to think that someone out there could be laughing at the intimate things you have said or written to those close to you.</p><p>Perhaps you think a whistle blower would have come forward by now to try to stop this.</p><p>One whistle blower did.</p><p>A former AT&T technician, Mark Klein, <a href="http://www.wired.com/science/discoveries/news/2006/04/70619">discovered a secret AT&T room</a> which the NSA was using to tap into the telecom giant's fiber optic cables. </p><p>On National Public Radio on November 7, 2007, Klein said this: "It's not just AT&T's traffic going through these cables, because these cables connected AT&T's network with other networks."</p><p>According to Klein, the NSA's equipment "just copies the entire data without any selection going on. So it's a complete copy of the data stream."</p><p>The reality is that the NSA looks at everything.</p><p>The reality is that the NSA looks at all of YOUR stuff.</p><p>After all, you could be a terrorist.</p><p>James Bamford, the author of the fascinating new study of the National Security Agency entitled "The Shadow Factory" says that the NSA has "the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss."</p><p>So is this the new America?</p><p>An America where the government watches everything that you say and do?</p><p>It reminds us of the lyrics from that old Alan Parsons Project song entitled "Eye In The Sky".....<br /><br /><span style="color: rgb(153, 0, 0);"><strong>I am the eye in the sky<br />Looking at you<br />I can read your mind<br />I am the maker of rules<br />Dealing with fools<br />I can cheat you blind<br />And I don't need to see any more<br />To know that<br />I can read your mind</strong></span></p><p><span style="color: rgb(153, 0, 0);"><strong><span style="font-weight: bold;"><span style="color: rgb(0, 0, 0);">*</span></span></strong></span></p><div class="comment-author"> <span style="font-size:85%;"><strong>Eldon</strong> Said, </span></div> <div class="comment-text"> <span style="font-size:85%;"><span class="medium"> <p> </p><p>People, please do your own research.<br />The FBI has given up on data that was encrypted, when it could have been worth a *few* million.<br />The NSA is NOT able to decrypt PGP with an acceptable key length.<br />PGP has no "backdoor," this "Additional Decryption Key" (ADK) was intended for corporate and .gov use, and later removed.<br />If you feel the internet could become censored, perhaps you should familiarize yourself with TOR, Freenet, Waste, and other handy software, before you _need_ to use them.</p> </span></span> </div><p><span style="color: rgb(153, 0, 0);"><strong><span style="font-weight: bold;"><span style="color: rgb(0, 0, 0);"></span></span><br /></strong></span> </p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-7486448719204649342008-12-08T09:54:00.002-05:002008-12-08T10:08:30.914-05:00Lawmakers, Activists Furious Over Random Laptop Border Searches<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8WAfP8YmzvhZDNA-hn-f0CO-n3vvcBZfvpiRZ-2ZFp5Akaapyk09OKHgO__DjdM9PgPLZqEirl1SpKVGIOPOxgP_jEY45Jfq34n_T0OM4yoEnK4jE1AG4qtdUZ1ieZHPexyl9Drni5nI/s1600-h/laptop.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 140px; height: 140px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8WAfP8YmzvhZDNA-hn-f0CO-n3vvcBZfvpiRZ-2ZFp5Akaapyk09OKHgO__DjdM9PgPLZqEirl1SpKVGIOPOxgP_jEY45Jfq34n_T0OM4yoEnK4jE1AG4qtdUZ1ieZHPexyl9Drni5nI/s320/laptop.jpg" alt="" id="BLOGGER_PHOTO_ID_5277436303576358066" border="0" /></a>U.S. Border agents have increased their scrutiny over those entering the country, going as far as scrutinizing photos on digital cameras, examining audio files on ipods and music devices as well as whatever you're laptop (or company laptop) may contain, including any Google keyboard searches.<br /><p>Full article: <a href="http://www.newsmax.com/newsfront/laptop_searches/2008/12/08/159310.html">Lawmakers, Activists Furious Over Random Laptop Border Searches</a><br /></p><p>Given all the personal details that people store on digital devices, border searches of laptops and other gadgets can give law enforcement officials far more revealing pictures of travelers than suitcase inspections might yield. That has set off alarms among civil liberties groups and travelers' advocates - and now among some members of Congress who hope to impose restrictions on the practice next year. </p><p> </p><p>They fear the government has crossed a sacred line by rummaging through electronic contact lists and confidential e-mail messages, trade secrets and proprietary business files, financial and medical records and other deeply private information. </p><p> </p><p>These searches, opponents say, threaten Fourth Amendment safeguards against unreasonable search and seizure and could chill free expression and other activities protected by the First Amendment. What's more, they warn, such searches raise concerns about ethnic and religious profiling since the targets often are Muslims, including U.S. citizens and permanent residents.<br /></p>Such searches, the government notes, have uncovered everything from martyrdom videos and other violent jihadist materials to child pornography and stolen intellectual property.<br /><p>The problem with this policy, argues Marcia Hofmann, staff attorney with the Electronic Frontier Foundation, is that the contents of a laptop or other digital device are fundamentally different than those of a typical suitcase. </p><p> </p><p>As Sen. Ron Wyden, D-Ore., who is co-sponsoring one of several bills in Congress that would restrict such searches, put it: "You can't put your life in a suitcase, but you can put your life on a computer." </p><p> </p><p>Susan Gurley, executive director of the Association of Corporate Travel Executives, which filed its own Freedom of Information request to obtain the government's laptop search policy, noted that border searches pose a particular concern for international business travelers. That's because they often carry sensitive corporate information on their laptops and don't have the option of leaving their computers at home. </p><p> </p><p>And for many travelers, the concerns go beyond their own privacy or the privacy of their employers. Lawyers may have documents subject to attorney-client privilege. Doctors may be carrying patient records. </p>Federal appeals courts in two circuits have upheld warrantless or "suspicionless" computer searches at the border that turned up images of child pornography used as evidence in criminal cases. <p> </p><p>But late last year, a U.S. magistrate judge in Vermont ruled that the government could not force a man to divulge the password to his laptop after a search at the Canadian border found child pornography. The U.S. Attorney's Office in Vermont is appealing the decision to the U.S. district court. </p><p> </p><p>Now Congress is getting involved. A handful of bills have been introduced that could pass next year.<br /></p><p>Rep. Eliot Engel, D-N.Y., is sponsoring a bill in the House that would also require suspicion to inspect electronic devices. Engel said he is not trying to impede legitimate searches to protect national security. But, he said, it is just as important to protect civil liberties. </p><p> </p><p>"It's outrageous that on a whim, a border agent can just ask you for your laptop," Engel said. "We can't just throw our constitutional rights out the window."<br /></p><p>[AP][NewsMax]<br /></p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-21622734321210139612008-12-08T01:56:00.003-05:002008-12-08T02:04:06.099-05:00New ID Scanners at Borders Raise Privacy Alarm<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaXsefnaq5AHzisVlxNjbTX4LecwwZhp47kxrPehqUmPOe2lTPkORa4C4NayLE2lcvtfPlphJoXxOEGkr28LgOclrgl1b88r4HiaP-y-mcbMmB8hXMmIM30vs9OSV5aTdRIh2aOyvG5AE/s1600-h/files.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 190px; height: 185px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaXsefnaq5AHzisVlxNjbTX4LecwwZhp47kxrPehqUmPOe2lTPkORa4C4NayLE2lcvtfPlphJoXxOEGkr28LgOclrgl1b88r4HiaP-y-mcbMmB8hXMmIM30vs9OSV5aTdRIh2aOyvG5AE/s320/files.jpg" alt="" id="BLOGGER_PHOTO_ID_5277310994555779218" border="0" /></a>The federal government has already deployed new detection machines that can scan citizens without their knowledge from as far as 50 feet away and “read” their personal documents such as passports or driver’s licenses. <p>The Homeland Security Department touts the high-tech devices as increasing security at border crossings, but privacy advocates are raising all sorts of red flags.</p> <p>Critics say the new machines, which read one’s personal information right through a wallet or purse, do so without consent or a warrant and may set a worrisome precedent.</p> <p><span id="more-1497"></span></p> <p>The devices, called Radio Frequency Identification (RFID) machines, allow officials to read remotely any passports, pass cards, and driver’s licenses that contain special chips with personal information.</p> <p>The RFIDs are so sensitive that, even before a vehicle pulls up at a border checkpoint, agents already will have on their computer screen the personal data of the passengers, including each person’s name, date of birth, nationality, passport or ID number, and even a digitized photo.</p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIaInOlEQvmE21iUzV71G6WSGXlEz5y2EH1_2j9t6MQY8WRQLjpp1ZifSmsHHm0FGMM0JShbApeQCSgbN26miz0Jpt5CvI455YYcNEwusmvzN_tDAwJqY2ALCuFU0JRbSVEew4lZE-uyY/s1600-h/us-border-patrol.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 169px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIaInOlEQvmE21iUzV71G6WSGXlEz5y2EH1_2j9t6MQY8WRQLjpp1ZifSmsHHm0FGMM0JShbApeQCSgbN26miz0Jpt5CvI455YYcNEwusmvzN_tDAwJqY2ALCuFU0JRbSVEew4lZE-uyY/s320/us-border-patrol.jpg" alt="" id="BLOGGER_PHOTO_ID_5277310755296708946" border="0" /></a><p>The new gadgets are in place, or soon will be, at five border crossings: Blaine, Wash.; Buffalo; Detroit; Nogales, Ariz.; and San Ysidro, Calif. They are slated to have a dramatically expanded presence in June.</p> <p>Lee Tien of the Electronic Frontier Foundation argues that the technology could make Americans less secure because terrorists or other criminals may be able to steal the personal information off the ID cards remotely.</p> <p>Tien and other critics warn that people up to no good can use their own RFID machines in a process called “skimming” to read the information from as far as 50 feet.</p> <p>Indeed, consumer privacy expert Katherine Albrecht maintains that the chips create the “potential for a whole surveillance network to be set up.” Among other abuses, she says police could use them to track criminals; abusive husbands could use the technology to find their wives; and stores could trail the shopping patterns of patrons.</p> <p>Homeland Security, however, rebuts the criticism, arguing that the embedded chips surrender only a code to machine readers. That code is then broken in order to display the personal information on the border agents’ screen.</p> <p>Meanwhile, the same agencies that are issuing the newfangled IDs supply a sleeve that keep out all prying electronic eyes when not in use.</p><p>[NewsMax]<br /></p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-83133723228844097202008-12-08T01:49:00.002-05:002008-12-08T01:52:59.012-05:00LANdroids: DoD turns Homeland into one big HotSpot<div style="text-align: center;"><span style="font-size:130%;"><a href="http://parallelnormal.wordpress.com/2007/07/19/corrupt-city-run-wi-fi-may-serve-intel-and-psyop-forces/" target="_blank">Urban wireless to serve intel and PSYOP forces</a></span><br /></div><br /><img src="http://parallelnormal.files.wordpress.com/2007/07/nettdroid.jpg" alt="" border="0" /><br /><i>The government needs more nodes: Various agencies want to seed cities with wireless networking devices (image from a DOD document).</i><br /><br />Despite the high costs and unproven social benefits for municipal broadband, dozens of U.S. cities are ignoring laws banning anti-competitive practices and getting into the internet business.<br /><br />Meanwhile, the U.S. Department of Defense is planning to build robots that configure themselves into ad hoc wireless networks within urban areas.<br /><br />City mayors claim they want to provide free and low-cost Wi-Fi access to the poor and attract business travelers. Defense planners say they need to have broadband capabilities in urban war zones.<br /><br />But rather than closing the “digital divide” (which many academics admit is being <a href="http://chronicle.com/free/v48/i11/11a05101.htm" target="_blank">exaggerated</a>), or providing a redundant service to traveling salesmen, it appears that officials aim to seize control of internet communications and track individuals in urban areas.<br /><br />Military and law enforcement agencies will also use the wireless networks to stage “hard PSYOP” attacks against a brain-chipped populace, according to historian and commentator <a href="http://cuttingthroughthematrix.com/" target="_blank">Alan Watt</a>, who specializes in secret societies and government intelligence operations.<br /><br />Philadelphia, San Francisco, Houston, and Providence, R.I. are among the cities partnering with private companies and the federal government to set up public broadband internet access. Providence used Homeland Security funds to construct a network for police, which may be made available to the public at a later date.<br /><br />None of the cities are expected to turn a profit anytime soon. Nor are the poor likely to benefit from the projects.<br /><br />Subscribers to Philly’s “Wireless Philadelphia” service, for example, will pay up to 73 percent more than the rate promised to them two years ago.<br /><br />“(Philadelphia) presented dangerously inaccurate estimates and figures for the costs and revenue” for its wireless network, according to a recent <a href="http://www.hcs.harvard.edu/%7Ecyberlaw/wiki/index.php/Cities_should_not_get_involved_in_the_implementation_of_a_wireless_network_because_it_diverts_public_funds_from_other_projects,_it_creates_unfair_competition_in_the_broadband_market,_and_it_has_proven_to_be_unsuccessful_in_other_cities." target="_blank">analysis</a> by students at Harvard Law School.<br /><br /><img src="http://parallelnormal.files.wordpress.com/2007/07/landroid.jpg" alt="" border="0" /><br /><i>Seeding: The DOD envisions soldiers dropping robots into cities. The robots will self-configure into what are known as “mesh networks.”</i><br /><br />City officials have managed to line their own pockets, however.<br /><br />Philadelphia’s former chief information officer, Dianah Neff (below, left), now <a href="http://www.kyw1060.com/pages/93633.php?contentType=4&contentId=213825" target="_blank">works for Civitium</a>, the consulting firm she paid $300,000 to help build Philly’s Wi-Fi network.<br /><br /><img src="http://www.usmayors.org/73rdAnnualMeeting/photos/neff_061105.jpg" alt="" border="0" /><br /><br />Denise Brady, San Francisco’s former deputy CIO, also took a position with Civitium after bringing the firm her city’s business.<br /><br />San Franciscans might actually lose more than money to their city’s muni Wi-Fi scheme.<br /><br />Google and Earthlink, the companies building San Francisco’s Wi-Fi network, want to place cameras and sensors atop lampposts at the same time they are installing their Wi-Fi antennae. The companies say they merely want to help police and emergency workers.<br /><br />The Electronic Frontier Foundation and the ACLU have <a href="http://www.eff.org/deeplinks/archives/004078.php" target="_blank">opposed</a> such police/public proposals.<br /><br />But even if the cities fail to complete their Wi-Fi projects, the military will be able to set up wireless networks within hours, perhaps even faster.<br /><br />The DOD, which is in the middle of <a href="http://www.jfcom.mil/about/experiments/nobleresolve.html" target="_blank">joint urban war-games</a> with Homeland Security and Canadian, Israeli and other international forces, is experimenting with Wi-Fi networks it can set up on the fly.<br /><br />According to a recent DOD announcement for contractors, soldiers will be able to drop robots, called LANdroids (below, left), when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network. (Click <a href="http://parallelnormal.files.wordpress.com/2007/07/07-46_pip.pdf" target="_blank">here</a> to download a PDF of the DOD announcement.)<br /><br /><img src="http://parallelnormal.files.wordpress.com/2007/07/landroid2.jpg" alt="" border="0" /><br /><br />The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of of individual computers and mobile phones–a scenario I <a href="http://www.boston.com/business/personaltech/articles/2006/05/15/turning_ashes_into_space_dust/" target="_blank">described</a> in the Boston Globe last year.<br /><br />In other words, where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail.<br /><br />The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the <a href="http://leav-www.army.mil/fmso/documents/InfoWar.pdf" target="_blank">DOD</a> believe.<br /><br />“We already are evolving toward technology implanting,” reads a 1996 <a href="https://www.maxwell.af.mil/au/2025/volume3/chap02/v3c2-4.htm" target="_blank">Air Force report</a>.<br /><br />People, already conditioned to receiving biological agents such as flu shots in their bodies, will welcome brain chips that promise to help them control technology, the Air Force report says.<br /><br />Indeed, Alan Watt believes one of the purposes of muni Wi-Fi and LANdroids will be to disseminate commands and propaganda directly into the human brain.<br /><br />Tracking and control of information via wireless networks are just the beginning, Watt said. “The implanted chip will be the end goal.”<br /><br />[parallelnormal.com][davidicke.com]<br />--------------------------------------------DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-77810220259656157472008-12-08T01:32:00.004-05:002008-12-08T01:47:36.721-05:00The "LifeLog Program": DARPA’s Control Freak Technology<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtFQYuVTIx-h0XY5gbNIVApxsJ5QvTKDTv38ZUYhQa5ab1dGHkWJm7zNSLI1FRfRYIYb5_anx6cmlCxCDs2LQMxQbsF0eJDuen-AUyKnkx1NM8tZE5SdxpSn3ONsa_XPiGOpDXCFbkjl8/s1600-h/braintap-1.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 240px; height: 282px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtFQYuVTIx-h0XY5gbNIVApxsJ5QvTKDTv38ZUYhQa5ab1dGHkWJm7zNSLI1FRfRYIYb5_anx6cmlCxCDs2LQMxQbsF0eJDuen-AUyKnkx1NM8tZE5SdxpSn3ONsa_XPiGOpDXCFbkjl8/s320/braintap-1.jpg" alt="" id="BLOGGER_PHOTO_ID_5277306645058271506" border="0" /></a>Thu, 13 Dec 2007 05:29:00<br /><br /><br /><a href="http://www.truthnews.us/?p=1240" target="_blank">(Truth News)</a> -- According to Wired, the Pentagon is "about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person's life, index all the information and make it searchable?. What national security experts and civil libertarians want to know is, why would the Defense Department want to do such a thing?"<br /><br />Once again, "security experts and civil libertarians" fail to understand the authoritarian, psychopathic mind. Our rulers do these sort of things because they are the ultimate control freaks, paranoid and suspicious of the average person ? or rather what the average person may do in order to get rid of the controllers, the parasites, who are compelled to spend billions of dollars on such projects, that is to say billions fleeced off the people they want to monitor and control. As usual, the excuse is they have to protect us from the terrorists, never mind they created the terrorists, too.<br /><br />"The embryonic <span style="font-weight: bold;">LifeLog program</span> would dump everything an individual does into a giant database: every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show watched, every magazine read," Wired continues. "All of this ? and more ? would combine with information gleaned from a variety of sources: a GPS transmitter to keep tabs on where that person went, audio-visual sensors to capture what he or she sees or says, and biomedical monitors to keep track of the individual's health."<br />In fact, a large part of this is already in place, thanks to the NSA's vacuum cleaner approach to searching for "al-Qaeda phone calls," cataloguing millions of phone calls each and every day, reading email, snooping internet destinations with the help of the telecoms. As for GPS, you have one in your cell phone, as well as a way for the snoops to listen in on what you say, even when you think the phone is switched off.<br /><br />If the government had its way ? and it may very well in a few years, thanks to the bovine nature of the average American ? you will be chipped or at minimum have an RFID in your wallet or purse, thus they will be track where you go and when.<br /><br />This gigantic amalgamation of personal information could then be used to "trace the ?threads' of an individual's life," to see exactly how a relationship or events developed, according to a briefing from the Defense Advanced Projects Research Agency, LifeLog's sponsor.<br /><br />Someone with access to the database could "retrieve a specific thread of past transactions, or recall an experience from a few seconds ago or from many years earlier ? by using a search-engine interface."<br /><br />For instance, it could be determined if you harbor "discontent" with the government, in other words if you're with al-Qaeda.<br /><br />On the surface, the project seems like the latest in a long line of <span style="font-weight: bold;">DARPA's "blue sky" research</span> efforts, most of which never make it out of the lab. But DARPA is currently asking businesses and universities for research proposals to begin moving LifeLog forward. And some people, such as Steven Aftergood, a defense analyst with the Federation of American Scientists, are worried.<br /><br />With its controversial <span style="font-weight: bold;">Total Information Awareness database project</span>, DARPA already is planning to track all of an individual's "transactional data" ? like what we buy and who gets our e-mail.<br /><br />While the parameters of the project have not yet been determined, Aftergood said he believes LifeLog could go far beyond TIA's scope, adding physical information (like how we feel) and media data (like what we read) to this transactional data.<br /><br />"LifeLog has the potential to become something like ?TIA cubed,'" he said.<br /><br />No doubt, the pointy-heads in the Pentagon are particularly interested in this "how we feel" aspect of the program. Not even Orwell was able to imagine such a scary control device.<br /><br />You see an image of our commander-guy on television or the web, your biomedical implant registers an elevated level or disgust, and the thought police are dispatched in SWAT fashion. It's off to the re-education camp for you.<br /><br />Of course, that's really "blue sky" stuff at this point. Instead, for the moment, we'll have to settle for DARPA tracking us on the internet, thanks to technology under development at Microsoft.<br /><br />In the private sector, a number of LifeLog-like efforts already are underway to digitally archive one's life ? to create a "surrogate memory," as minicomputer pioneer Gordon Bell calls it.<br /><br />Bell, now with Microsoft, scans all his letters and memos, records his conversations, saves all the Web pages he's visited and e-mails he's received and puts them into an electronic storehouse dubbed MyLifeBits.<br /><br />DARPA's LifeLog would take this concept several steps further by tracking where people go and what they see.<br /><br />Of course, if you know the government is tracking where you go, chances are you may not go there. And that's why DARPA is spending your hard-earned tax money on technology you can't get around, just in case you're with al-Qaeda or a Ron Paul supporter.<br /><br />That makes the project similar to the work of University of Toronto professor Steve Mann. Since his teen years in the 1970s, Mann, a self-styled "cyborg," has worn a camera and an array of sensors to record his existence. He claims he's convinced 20 to 30 of his current and former students to do the same. It's all part of an experiment into "existential technology" and "the metaphysics of free will."<br /><br />DARPA isn't quite so philosophical about LifeLog. But the agency does see some potential battlefield uses for the program.<br /><br />Indeed, military types are not normally interested in all that philosophical stuff, as they are too busy finding and eliminating enemies. DARPA concentrates on the battlefield and the battlefield is right here on Main Street. DARPA does somersaults to fit LifeLog into a traditional military context but it fails and fails miserably. Obviously, this system is for us, the commoners, and the real enemies of power.<br /><br />John Pike, director of defense think tank GlobalSecurity.org, said he finds the explanations "hard to believe."<br /><br />"It looks like an outgrowth of Total Information Awareness and other DARPA homeland security surveillance programs," he added in an e-mail.<br /><br />Sure, LifeLog could be used to train robotic assistants. But it also could become a way to profile suspected terrorists, said Cory Doctorow, with the Electronic Frontier Foundation. In other words, Osama bin Laden's agent takes a walk around the block at 10 each morning, buys a bagel and a newspaper at the corner store and then calls his mother. You do the same things ? so maybe you're an al Qaeda member, too!<br /><br />Bingo! And as we know, al-Qaeda now encompasses at lot of behavior, as even garden variety criminals are considered terrorists. But the run-of-the-mill pot smoker or bad check writer pales in comparison to those who are walking around experiencing "discontent" with the government. Obviously, a bad check writer will have at best minimal influence on the government while an al-Qaeda terrorist in a 9/11 truth t-shirt is most certainly a direct challenge and threat to the guys in charge, and that's why DARPA was put on the case.<br /><br />"The more that an individual's characteristic behavior patterns ? ?routines, relationships and habits' ? can be represented in digital form, the easier it would become to distinguish among different individuals, or to monitor one," Aftergood, the Federation of American Scientists analyst, wrote in an e-mail.<br /><br />In its LifeLog report, DARPA makes some nods to privacy protection, like when it suggests that "properly anonymized access to LifeLog data might support medical research and the early detection of an emerging epidemic."<br /><br />But before these grand plans get underway, LifeLog will start small. Right now, DARPA is asking industry and academics to submit proposals for 18-month research efforts, with a possible 24-month extension. (DARPA is not sure yet how much money it will sink into the program.)<br /><br />Not that money is an object when the American tax payer is picking up the tab.<br /><br />Like a game show, winning this DARPA prize eventually will earn the lucky scientists a trip for three to Washington, D.C. Except on this excursion, every participating scientist's e-mail to the travel agent, every padded bar bill and every mad lunge for a cab will be monitored, categorized and later dissected.<br /><br />And if the scientists are not extra careful, they may end up dead or missing, like not shortage microbiologists, as secret program like to clean up and stragglers who may cause embarrassment or Nuremberg-like trials down the road.<br /><br />[Kurt Nimmo][Wired][Truth News]DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-62276034836344376192008-12-08T01:24:00.003-05:002008-12-08T01:31:19.144-05:00Rhode Island School Children to be Chipped Like Dogs<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KWr0NJX9V9FawsXxgDinLmU_AU8Dc1gfWX6pkAyvu7c8UfAXT4UkFgHsKPKjV1hyphenhyphenWpIUSZxBsG_2UyZsEIcjdbOi3rQ1rP1eUvQEMCZfSGJ24eO8Tn_YbaC5mJL8NacU1vbEkcnLp98/s1600-h/china.dog.chip.getty.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 129px; height: 142px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9KWr0NJX9V9FawsXxgDinLmU_AU8Dc1gfWX6pkAyvu7c8UfAXT4UkFgHsKPKjV1hyphenhyphenWpIUSZxBsG_2UyZsEIcjdbOi3rQ1rP1eUvQEMCZfSGJ24eO8Tn_YbaC5mJL8NacU1vbEkcnLp98/s320/china.dog.chip.getty.jpg" alt="" id="BLOGGER_PHOTO_ID_5277302796679110194" border="0" /></a><br /><div id="post_message_244573"> <a href="http://www.sott.net/articles/show/147138-US-Rhode-Island-School-Children-to-be-Chipped-Like-Dogs" target="_blank">US: Rhode Island School Children to be Chipped Like Dogs</a><br /><span style="font-size:85%;">Sun, 13 Jan 2008 08:40 EST</span><br /><br />MIDDLETOWN - The Rhode Island affiliate of the American Civil Liberties Union is calling on the Middletown School Department to drop its planned pilot program of a student-tracking system that the ACLU says would treat children like "cattle" and violate their privacy.<br /><br />The school district this month will test the Mobile Accountability Program, or MAP, which will place GPS tracking devices in two school buses and attach radio-frequency identification labels to the backpacks of the 80 or so Aquidneck Elementary School students who ride those buses. School administrators will then be able to monitor - in real-time, via an online map of Middletown at MAPIT's secure Web site - the progress of those buses and their passengers as the children enter and exit the buses.<br /><br />MAP is designed to improve transportation safety and efficiency and the pilot would last for the rest of the school year, after which school officials will determine whether to expand the program to the district's entire bus fleet.<br /><br />The ACLU, in a letter Friday to Schools Supt. Rosemarie K. Kraeger, expressed its "deep concerns" about MAP and urged the school district to halt the pilot project.<br /><br />Using radio-frequency technology to track school buses seems "rather unnecessary," ACLU executive director Steven Brown wrote.<br /><br />But it's Middletown's use of electronic chips to also monitor the students themselves that most troubles the ACLU, Brown wrote.<br /><br />"RFID [radio-frequency ID] technology was originally developed to track products and cattle," Brown wrote.<br /><br />"The privacy and security implications with using this technology for tagging human beings, particularly children, are considerable.... Requiring students to wear RFID labels treats them as objects, not children. The Middletown school district sends a very disturbing message to its young students when it monitors them using technology employed to track cattle, sheep and shipment pallets in warehouses."<br /><br />Plus, the IDs could be unsafe, according to the ACLU, because Web sites sell electronic readers that can intercept the data on students' tags.<br /><br />Schools Supt. Rosemarie K. Kraeger said yesterday that the school district doesn't plan to abandon its pilot program. School officials, she said, considered MAP for more than a year and questioned the provider, MAPIT Corp., about how students' privacy would be protected.<br /><br />She said the school district is confident that the program includes the necessary safeguards to protect students' identities.<br /><br />"I wish Mr. Brown had called to find out the details of the project," Kraeger said.<br /><br />"The company went to extra pains to make sure all our concerns had been addressed, and we did our due diligence. We feel secure."<br /><br />The School Department sent letters to the parents of the 80 children included in the pilot, and Kraeger said none have complained.<br /><br />In fact, she said, two parents have recently e-mailed her to express support for the tracking program.<br /><br />Nonetheless, the ACLU is urging Middletown schools to "respect the privacy and civil liberties of Middletown's elementary school students" and reconsider implementing the MAP pilot.<br /><br />"This is just another example of overkill," Brown said yesterday.<br /><br /><b>"The biggest concern is how this could acclimate young kids at an early age to being monitored by the government."</b><br /><br /><span style="font-size:85%;">Meaghan Wims<br /></span><br /><a style="color: rgb(0, 0, 0);" href="mailto:mwims@projo.com"><span style="color: rgb(255, 255, 255);">[mwims@projo.com][blogger.com,</span><span style="color: rgb(255, 255, 255);font-size:85%;" >Providence Journal]</span></a> </div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-78853999759348963922008-12-08T01:16:00.005-05:002008-12-08T01:21:34.434-05:00Resource Websites: RFID<p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u style="color: rgb(255, 255, 255);"><span lang="EN-GB"><span style="font-family:verdana;">A) Websites :</span></span></u><u><span lang="EN-GB"><span style="color:fuchsia;"><span style="font-family:verdana;"><o:p></o:p></span></span></span></u></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"><span style=""> </span><o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt 36pt; text-indent: -18pt; color: rgb(255, 255, 255); font-weight: bold;"><span style=";font-family:verdana;font-size:100%;" ><br /><span dir="ltr"><u><span lang="EN-GB"></span></u></span><span lang="EN-GB"> <o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; color: rgb(255, 255, 255); font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u><span style="color:blue;"><span lang="EN-GB" style="color:blue;"><a href="http://www.adsx.com/" target="_blank"><span style="font-family:verdana;">http://www.adsx.com</span></a></span></span></u></span><span style=";font-family:verdana;font-size:100%;" ><span style="color:lawngreen;"> </span><span lang="EN-GB"><span style="color:lime;"><span style="color: rgb(255, 255, 255);">(Applied Digital Solutions’ website, the company that markets the verichip) </span><o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style=";font-size:100%;color:blue;" ><span lang="EN-GB" style="color:blue;"><a href="http://www.trovan.com/" target="_blank"><span style="font-family:verdana;"><br /></span></a></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style=";font-size:100%;color:blue;" ><span lang="EN-GB" style="color:blue;"><a href="http://www.trovan.com/" target="_blank"><span style="font-family:verdana;">http://www.trovan.com</span></a></span></span><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"> <span style="color: rgb(255, 255, 255);">(Trovan’s website, a <u>european</u> company that also markets a subcutaneous microchip for humans )</span><span style="color: rgb(255, 255, 255);"> </span><span style=""><span style="color: rgb(255, 255, 255);"> </span> </span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"> </p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><span style=""><a href="http://www.nocards.org/" target="_blank"><span style="font-family:verdana;"><br /></span></a></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><span style=""><a href="http://www.nocards.org/" target="_blank"><span style="font-family:verdana;">http://www.nocards.org/</span></a><span style="font-family:verdana;"> <span style="color: rgb(255, 255, 255);">(Consumers Against Supermarket Privacy Invasion And Numbering,CASPIAN's privacy advocates website)</span></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"> </p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><span style=""><a href="http://www.spychips.com/" target="_blank"><span style="font-family:verdana;"><br /></span></a></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><span style=""><a href="http://www.spychips.com/" target="_blank"><span style="font-family:verdana;">http://www.spychips.com/</span></a><span style="font-family:verdana;"> <span style="color: rgb(255, 255, 255);">(Stop RFID website)</span></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u><span lang="EN-GB" style="color:blue;"><a href="http://www.cybertime.net/%7Eajgood/ch1p1.html" target="_blank"><span style="font-family:verdana;"><br /></span></a></span></u></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u><span lang="EN-GB" style="color:blue;"><a href="http://www.cybertime.net/%7Eajgood/ch1p1.html" target="_blank"><span style="font-family:verdana;">http://www.cybertime.net/~ajgood/ch1p1.html</span></a></span></u></span><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"> <span style="color:lime;"><span style="color: rgb(255, 255, 255);">(extremely well documented website !)</span><o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span class="Hyperlink" style="font-size:100%;"><span lang="EN-GB" style="color:blue;"><u><a href="http://www.cybertime.net/%7Eajgood/ch1p2.html" target="_blank"><span style="font-family:verdana;"><br /></span></a></u></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span class="Hyperlink" style="font-size:100%;"><span lang="EN-GB" style="color:blue;"><u><a href="http://www.cybertime.net/%7Eajgood/ch1p2.html" target="_blank"><span style="font-family:verdana;">http://www.cybertime.net/~ajgood/ch1p2.html</span></a></u></span></span><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"> <span style="color:lime;"><span style="color: rgb(255, 255, 255);">(extremely well documented website !)</span><o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span class="Hyperlink" style="font-size:100%;"><span lang="EN-GB" style="color:blue;"><u><a href="http://www.prisonplanet.com/" target="_blank"><span style="font-family:verdana;">http://www.prisonplanet.com</span></a></u></span></span><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"> <o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u><span lang="EN-GB" style="color:blue;"><a href="http://amsterdam.nettime.org/List-Archives/nettime-bold-0111/msg00237.html" target="_blank"><span style="font-family:verdana;"><br /></span></a></span></u></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span style="font-size:100%;"><u><span lang="EN-GB" style="color:blue;"><a href="http://amsterdam.nettime.org/List-Archives/nettime-bold-0111/msg00237.html" target="_blank"><span style="font-family:verdana;">http://amsterdam.nettime.org/List-Archives/nettime-bold-0111/msg00237.html</span></a></span></u></span><span lang="EN-GB" style="font-size:100%;"><span style="font-family:verdana;"> <o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt; font-weight: bold;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="font-family:verdana;"> </span></o:p></span></p> <span style="font-weight: bold;font-size:100%;" ><u><span lang="EN-GB" style="color:blue;"><br /><a href="http://www.universe-people.com/" target="_blank"><span style="font-family:verdana;">http://www.universe-people.com</span></a></span></u></span><span lang="EN-GB" style="font-size:12;"><span style="font-family:verdana;"><span style="font-weight: bold;font-size:100%;" > </span><span style="color: rgb(255, 255, 255);"><span style="font-weight: bold;font-size:100%;" >(including a petition in English against the micr</span><span style="font-weight: bold;font-size:100%;" >ochip impl</span>ant !)<br />[freewebs.com/nochip/]<br /></span></span></span>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-25881553629561531852008-12-08T01:03:00.004-05:002008-12-08T01:15:15.413-05:00Microchip implants for humans : THE article !<a href="http://www.freewebs.com/nochip/">http://www.freewebs.com/nochip/</a><br /><br />Probably one of the most informative articles I've run across detailing the various types of implanting/tracking around the globe from conception to introduction.<br />Here are some juicy tidbits you'll find:<br /><br /><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:12;"><span style=""> </span><span style=";font-size:100%;color:lime;" >Well, today, the microchip is part of what is named the “RFID” technologies (for Radio Frequency Identification Devices), or of the ICT implants (implants of the Internet and Communication Technologies). <o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="color:lime;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB"><span style=""> </span>In the </span><st1:country-region><st1:place><span lang="EN-GB">United States of America</span></st1:place></st1:country-region><span lang="EN-GB">, it’s possible for any citizen, since the end of 2002, to get the microchip implant for the “modest” amount of 200 dollars !!! <b style=""><u>The company A.D.S. (Applied Digital Solutions Inc.), through its subsidiary company “Verichip”, was indeed authorized to commercialise its revolting microchip implant that is also named “verichip”.</u></b></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB"><br /></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB">The verichip, in its current version, works with handheld proprietary scanners/readers, and with online databases that give all the information (public AND private) necessary. In a very close future, a GPS-based verichip, <span style=""> </span>just like the cellphones that we all know, will work with relay antennas and the GPS satellite system. Its bearer will become totally localizable from space. For further information, please go to : <u><span style="color:blue;"><a href="http://www.adsx.com/" target="_blank">http://www.adsx.com </a></span></u><span style="">or to : <a href="http://www.4verichip.com/" target="_blank">http://www.4verichip.com</a> </span><o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="color:lime;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><span style="color:lime;"><span style=""> </span>Furthermore, this microchip implant has a serial number containing 18 digits, and that number is divided in 3 groups of 6 digits (6, 6, 6… does this remind you anything ?).<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB">“But where’s the problem ?”, will you think, since those good people chose that option in all liberty ? Well, the problem lies here : <b style=""><u>there are law projects that passed through the American Congress and that will allow to inject the microchip implant to children from birth, under so-called “identification purposes”. Moreover, the president of the </u></b></span><st1:country-region><st1:place><b style=""><u><span lang="EN-GB">U.S.A.</span></u></b></st1:place></st1:country-region><b style=""><u><span lang="EN-GB">, following article 100 of the 1986 law on control of immigration, has the power to decide any kind of identification measure that he finds necessary, including a subcutaneous microchip.</span></u></b></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB"><span style=""> </span><br /></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB">The microchip implant<span style=""> </span>was already used during the Gulf war in august 1991; it has<span style=""> </span>already been tested on soldiers, government officials and on the personnel of some enterprises. If we don't fight, soon it will be too late and the chip will become mandatory for all to get !<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="color:lime;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB" style="font-family:'Times New Roman';"><span style=""> </span><span style="font-family:verdana;">Still in the </span></span><span style="font-family:verdana;"><st1:country-region><st1:place><span lang="EN-GB" style="font-family:'Times New Roman';">USA</span></st1:place></st1:country-region><span lang="EN-GB" style="font-family:'Times New Roman';">, <span style="font-family:verdana;">the ex-attorney general (who’s also a general), John Ashcroft, allowed the development of <i style=""><u>“internment camps for civilians”.</u></i> <i style=""><br /></i></span></span></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB" style="font-family:'Times New Roman';"><span style="font-family:verdana;"><i style="">In a video called <span style="font-weight: bold;">“</span></i><i style="font-weight: bold;">Gulag </i></span></span></span><span style="font-family:verdana;"><st1:country-region style="font-weight: bold;"><st1:place><i style=""><span lang="EN-GB" style="font-family:'Times New Roman';">USA</span></i></st1:place></st1:country-region><i style=""><span lang="EN-GB" style="font-family:'Times New Roman';"><span style="font-weight: bold;">”</span>, <span style="font-family:verdana;">it was proved that these camps are full of torture devices, </span></span></i><i><span lang="EN-GB" style="font-family:'Times New Roman';"><span style="font-family:verdana;"><u>b</u></span></span></i><i><span lang="EN-GB" style="font-family:'Times New Roman';"><span style="font-family:verdana;"><u>ut also of devices allowing to implant prisoners with the subcutaneous microchip !!!</u></span></span></i></span></span><span style=";font-family:'Times New Roman';font-size:100%;" lang="EN-GB"><span style=";font-family:verdana;color:lime;" ><span style="font-family:verdana;"> </span><br /></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-family:'Times New Roman';font-size:100%;" lang="EN-GB"><span style=";font-family:verdana;color:lime;" ><br /></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-family:'Times New Roman';font-size:100%;" lang="EN-GB"><span style=";font-family:verdana;color:lime;" >During World War II, nazis would “mark” </span><span style="color:lime;"><span style="font-family:verdana;"><span lang="EN-GB">prisoners at the entrance of the camps thanks to tattoos… Nowadays, the </span><st1:country-region><st1:place><span lang="EN-GB">USA</span></st1:place></st1:country-region><span lang="EN-GB">, in these camps for civilians, would mark the prisoners (civilians !) with subcutaneous microchips in order to identify them and to follow their slightest move !<o:p></o:p></span></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="color:lime;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><span style="color:lime;"><span style=""> </span><span style="font-family:verdana;">Even scarier : lately, the U.S. independent press warned about <i style=""><u>the </u></i><i style=""><u>existence of a project that will make the “chipping” of the homeless mandatory in 5 States, including New York and California ! So this means that the microchip will begin to become MANDATORY, starting with the weakest parts of the population !</u></i></span></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style="font-size:100%;"><br /></span><span lang="EN-GB" style="font-size:100%;"><span style="color:lime;"><span style="font-family:verdana;"> The pretext invoked makes an amalgam between the homeless and the criminals (the homeless “become criminals easily”) !!!</span><span style=""> </span><o:p></o:p></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style="color:lime;"> </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span lang="EN-GB"><span style=""> </span><span style=""> </span><span style="font-family:verdana;">In October 2004, the Food and Drug Administration gave the authorization to the verichip to be used in </span></span><span style="font-family:verdana;"><st1:country-region><st1:place><span lang="EN-GB">U.S.</span></st1:place></st1:country-region><span lang="EN-GB"> hospitals “for medical purposes”,<span style=""> </span>even though this disgusting implant represents dangers for people’s health (see chapter 4 : the true dangers of the microchip and of its functioning) !!! <u>Question :</u> who, during his/her lifetime, doesn’t go to the hospital at least once ? <u>If one begins to “chip” sick people in hospitals for so-called “medical monitoring” purposes, the whole population will be chipped sooner or later !!!</u><o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><span style="color:lime;"><span style="font-family:verdana;"><span style=""> </span><span style=""> </span>The Food and Drug Administration definitively classified the verichip as a “class II medical device requiring special controls” !<o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><span style="color:lime;"><span style="font-family:verdana;"><span style=""> </span>American intellectuals and CEO’s also began to be “chipped” !<o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB"><span style=""> </span>And the verichip begins to be used in American hospitals ! For instance, the Boston-based </span><st1:place><st1:placename><span lang="EN-GB">Beth</span></st1:placename><span lang="EN-GB"> </span><st1:placename><span lang="EN-GB">Israel</span></st1:placename><span lang="EN-GB"> </span><st1:placename><span lang="EN-GB">Deaconess</span></st1:placename><span lang="EN-GB"> </span><st1:placename><span lang="EN-GB">Medical</span></st1:placename><span lang="EN-GB"> </span><st1:placetype><span lang="EN-GB">Center</span></st1:placetype></st1:place><span lang="EN-GB"> installed in its emergency room verichip scanners/readers, and gets ready to chip the patients !!!<o:p></o:p></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><o:p><span style=";font-family:verdana;color:lime;" > </span></o:p></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB"><span style=""> </span>Still in the </span><st1:country-region><st1:place><span lang="EN-GB">U.S.A.</span></st1:place></st1:country-region><span lang="EN-GB"> , a bus called the “Chipmobile” drives through the different states, trying to encourage people to get chipped ! And when they find a place where plenty unaware people are interested in getting chipped, Verichip Corporation builds a verichip center to spread the chip and its influence !<br /></span></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style="font-size:100%;"><br /></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; color: rgb(255, 0, 0);"><span style="font-size:100%;"><span style="font-family:verdana;"><span lang="EN-GB">The ChipMobile?????? Are you kidding me?</span></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:100%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB"><br /></span></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"> </p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-family:verdana;font-size:100%;" ><span style="color:lime;"><span lang="EN-GB"> <span style="font-weight: bold;"> </span><strong style="font-weight: normal;"><span style="color:yellow;"><u>Finally, always in the U.S.A. , here are the latest alarming news : a former Wisconsin governor and ex-secretary of the U.S. Department of Health and Human Services under George W. Bush, Tommy Thompson, has just joined the Applied Digital So</u></span></strong></span></span><span lang="EN-GB"><strong><span style="color:yellow;"><u>lutions board of directors and should get "chipped" very soon.</u></span></strong></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-family:verdana;font-size:100%;" ><span lang="EN-GB"><strong><span style="color:yellow;"><u><br /></u></span></strong></span></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><strong></strong></span> </p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><strong><span style=";font-family:verdana;color:yellow;" > <u>BUT THE MOST HORRIBLE THING IS THAT HE JUST PROPOSED A BILL (July 2005). AND THAT BILL, IF IT'S ADOPTED, WOULD ALLOW THE CHIPPING OF ALL U.S. CITIZENS !!!</u></span></strong></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span lang="EN-GB" style="font-size:100%;"><strong><span style=";font-family:verdana;color:yellow;" ><u><br /></u> </span></strong></span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"> </p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-family:verdana;font-size:100%;color:lime;" > </span></p> <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:130%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB"><span style=""><span style="font-size:100%;"> In September 2005, after the ravages caused by the hurricane "Katrina", Verichip Corporation chipped the corpses of the victims of this terrible natural disaster. Some more free advertisement for the scums from Verichip Corp. ! Besides, some stocks of microchips were made in Louisiana and in Mississipi, "just in case there would be other natural disasters"...</span><br /></span></span></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><br /></p>[freewebs.com] <p class="MsoNormal" style="margin: 0cm 0cm 0pt;"><span style=";font-size:130%;color:lime;" ><span style="font-family:verdana;"><span lang="EN-GB"><span style=""></span></span></span></span><br /></p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com2tag:blogger.com,1999:blog-7963172716739485356.post-41705800424073856162008-12-08T00:58:00.001-05:002008-12-08T01:00:16.697-05:00Texas Considers Putting RFID Tags in All Cars<p class="subheadline_body"> <span style="font-size:78%;"><a href="http://www.mysanantonio.com/global-includes/printstory.jsp?path=/business/stories/MYSA040805.1A.rfid.1b74706e7.html">San Antonio Express-News | April 8, 2005 </a><br /><strong>By L.A. Lorek </strong></span> </p> <table width="100%" border="0" cellpadding="0" cellspacing="0"> <tbody><tr> <td valign="top" width="60%"><span class="subheadline_body">With the help of a dime-size adhesive tag on a vehicle's windshield and cutting-edge technology that detractors equate with Big Brother, police soon could track Texas cars and trucks — if a legislator's bill makes it into law. </span></td> <td valign="top" width="40%"><table width="100%" border="0" cellpadding="5" cellspacing="0"> <tbody><tr> <td><table width="100%" border="0" cellpadding="1" cellspacing="0"> <tbody><tr> <td bgcolor="#999999"><table width="100%" border="0" cellpadding="3" cellspacing="0"> <tbody><tr> <td class="subheadline_body" valign="top" align="center"><strong>RELATED:</strong></td> </tr> <tr> <td class="subheadline_body" bgcolor="#cccccc"><span class="body_headline"><a href="http://www.infowars.com/articles/bb/rfid_tx_considers_tags_in_all_cars.htm">Texas Bill Would Require Transponders in All Cars </a></span></td> </tr> </tbody></table></td> </tr> </tbody></table></td> </tr> </tbody></table></td> </tr> </tbody></table> <p class="subheadline_body">Though the bill hasn't made it out of the Texas House of Representatives' Transportation Committee, it already has generated outrage among technophiles and privacy advocates who believe the technology, once introduced, will creep into other law enforcement areas. </p> <p class="subheadline_body">"Why don't they just tag us like cattle and be done with it?" said Scott Henson, director of the American Civil Liberties Union's Texas police accountability project in Austin. </p> <p class="subheadline_body">House Bill 2893 calls for the state to use radio frequency identification devices, or RFID, for auto-insurance enforcement. </p> <p class="subheadline_body">The bill excludes other law enforcement use, but privacy experts say it does little to protect personal rights. </p> <p class="subheadline_body">"It's overkill, in my opinion," said Beth Givens, director of Privacy Rights Clearinghouse, a San Diego-based nonprofit advocacy group. </p> <p class="subheadline_body">The tags, which can be attached to just about anything, contain antennae that transmit data to be read by a receiver up to 25 feet away. </p> <p class="subheadline_body">It's unclear whether the bill, which has not had a committee hearing, can pass. </p> <p class="subheadline_body">Bill sponsor Rep. Larry Phillips, R-Sherman, thinks it's a good idea to look at the technology and decide whether it can help law enforcement do a better job and also protect privacy. </p> <p class="subheadline_body">"The whole concept of it is being able to let us verify whether people have insurance," said Phillips. "It's a little different approach." </p> <p class="subheadline_body">The proposed RFID system works similar to the toll tags on cars today, and doesn't contain personal information, Phillips said. </p> <p class="subheadline_body">Under Phillips' bill, the RFID tags would be placed on registration stickers affixed to the windshield. The tags would verify whether the vehicle is covered by automobile liability insurance. </p> <p class="subheadline_body">A device such as a handheld scanner or a transmitter at a toll booth could read the tags and check them against a computer database that could immediately verify if the vehicle's insurance is current. Insurance companies would be responsible for supplying updated information to the database, which would be maintained by state agencies. </p> <p class="subheadline_body">But privacy advocates say the RFID technology is subject to abuse. The readers could be placed on every lamppost or mile marker on a highway, and police could use them to track automobiles. </p> <p class="subheadline_body">That means that if a car speeds by the device, then that motorist may receive a ticket in the mail similar to cameras that track people who blow through red lights now, Henson said. </p> <p class="subheadline_body">"It's like swatting a fly with a sledgehammer for really what are seemingly small crimes like not having your insurance or toll violations," Henson said. "He's creating a technology that could be abused in all sorts of ways with virtually no restrictions in the bill on law enforcement." </p> <p class="subheadline_body">With RFID, the government could track all of us as dots on computer screens, Henson said. Once the technology is in place, he said, it would be hard to prevent it from being used for other applications. </p> <p class="subheadline_body">The bill was scheduled for a public hearing Tuesday, but the Transportation Committee didn't discuss it. </p> <p class="subheadline_body">The Spring School District near Houston uses RFID tags to keep tabs on its 28,000 students on school property.<br /></p><p class="subheadline_body">[<a href="http://www.mysanantonio.com/global-includes/printstory.jsp?path=/business/stories/MYSA040805.1A.rfid.1b74706e7.html">San Antonio Express-News</a>]</p>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-78354797846565863632008-12-08T00:48:00.004-05:002008-12-08T00:54:42.060-05:00Homemade RFID tag zapper<div class="entry-body"> <p>Radio frequency IDs (RFIDs), small electronic chips that share information when scanned, are rapidly becoming an essential part of global supply management. In order to correctly route and track items from inception to purchase, these chips are attached to packaging and increasingly the products themselves. </p> The intentional disabling of these chips can cause supply chain disruption. The best method is to HERF (high energy radio frequency, usually microwaves) the chips using a small transmitter (<a href="http://globalguerrillas.typepad.com/globalguerrillas/2004/05/journal_homemad.html">read about</a> high power home made microwave weapons for <i>herfing</i>). The German branch (privacy activists) of the global guerrilla innovation network <a href="https://events.ccc.de/congress/2005/wiki/RFID-Zapper%28EN%29">has developed a simple solution</a> that converts a standard film camera into a short range RFID zapper. This system: <a href="https://events.ccc.de/congress/2005/wiki/RFID-Zapper%28EN%29"><img src="http://globalguerrillas.typepad.com/globalguerrillas//180px-22c3_mahajivana_img_0419_213x320.jpg" alt="180px-22c3_mahajivana_img_0419_213x320.jpg" width="180" align="left" border="0" height="270" /></a><blockquote>"...copies the microwave-oven-method, but in a much smaller scale. It generates a strong electromagnetic field with a coil, which should be placed as near to the target-RFID-Tag as possible. The RFID-Tag then will recive a strong shock of energy comparable with an EMP and some part of it will blow, most likely the capacitator, thus deactivating the chip forever.</blockquote> <blockquote>To keep the costs of the RFID-Zapper as low as possible, we decided to modify the electric component of a singe-use-camera with flashlight, as can be found almost everywhere. The coil is made from varnished wire and placed inside the camera exactly where the film has been.</blockquote> <a href="https://events.ccc.de/congress/2005/wiki/RFID-Zapper%28EN%29"><img src="http://globalguerrillas.typepad.com/globalguerrillas//180px-22c3_mahajivana_img_0443_360x447.jpg" alt="180px-22c3_mahajivana_img_0443_360x447.jpg" width="180" align="right" border="0" height="224" /></a><blockquote>Then the coil is soldered between the cameras electronic and its flashlight. Last but not least most single-use-cameras will require some kind of switch to be build into them, since their activating-mechanism usually is to small and primitive. Once the switch is connected and tested, the camera can be closed again and henceforth will serve as a RFID-Zapper, destroying RFID-Tags with the power of ordinary batteries."<br /><br /><br /><a href="http://www.networkworld.com/Home/jcox.html">John Cox</a>, NetworkWorld.com<br /><p>As if there wasn't enough for network professionals to worry about.</p> <p>Ex-Forrester Research analyst John Robb <a target="_blank" href="http://globalguerrillas.typepad.com/globalguerrillas/2006/01/weapons_the_rfi.html">describes a project</a> that modifies a single-use film camera, to create a short range microwave pulse that can fry nearby RFID tags.</p> <p>Robb says this and similar devices could be used to disrupt RFID-based supply chains. But...</p> <a name="more"></a> <p>...I'm skeptical. A short range device can only affect the tags immediately nearby. My guess is a would-be supply chain saboteur would have to visit an awful lot of Wal-Marts, and walk through most of every store, carrying around a backpack load of batteries to keep the little Zapper zapping. </p> <p>Even then, it's not clear that the supply chain would be in fact disrupted: you might lose RFID data and tracking on the items zapped, but the RFID infrastructure of readers and servers would still be in place, ready to read the next lot of tagged merchandise.</p> <p>The Zapper is the offspring of a German group calling itself the Chaos Communication Congress, which held its <a href="https://events.ccc.de/congress/2005/">22nd annual meeting</a> last month in Berlin.<br /></p><p>[NetworkWorld.com, GlobalGuerrillas.com]<br /></p><br /></blockquote> </div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-48883317244814790302008-12-08T00:10:00.001-05:002008-12-08T00:13:27.745-05:00<div style="text-align: center; font-weight: bold;"><span style="font-size:130%;">European court rules DNA database breaches human rights</span><br /><br /></div><span style="font-size:85%;">Peter Walker<br />Thursday December 4 2008 10.55 GMT</span><br /><br /><div id="box"><div id="article-header"><div id="main-article-info"> </div></div><div id="content"><div style="text-align: center;"> </div><div id="article-wrapper"><div style="text-align: center;"> </div><div class="image"><div style="text-align: center;"> <img style="width: 371px; height: 222px;" src="http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2008/02/27/dna460276.jpg" alt="DNA sampling" /> </div><p class="caption">Only DNA samples for those convicted of crimes should be kept, according to the ruling.<br /></p> </div> <p>Police forces in much of the UK could be forced to destroy the DNA details of hundreds of thousands of people with no criminal convictions, after a court ruled today that keeping them breaches human rights.</p><p>The European court of human rights in Strasbourg said that keeping innocent people's <a href="http://www.guardian.co.uk/politics/dna-database">DNA records</a> on a criminal register breached article eight of the Human Rights Convention, covering the right to respect for private and family life.</p><p>The decision was welcomed by civil liberties campaigners, but the home secretary, Jacqui Smith, said she was "disappointed". Police chiefs warned that destroying DNA details would make it harder to investigate many crimes.</p><p>The European court said that keeping DNA material from those who were "entitled to the presumption of innocence" as they had never been convicted of an offence, carried "the risk of stigmatisation".</p><p>Attacking the "blanket and indiscriminate nature" of the power to retain data, the judges said protections offered by article eight "would be unacceptably weakened if the use of modern scientific techniques in the criminal justice system were allowed at any cost and without carefully balancing the potential benefits of the extensive use of such techniques against important private-life interests".</p><p>The decision could oblige the government to order the destruction of DNA data belonging to those without criminal convictions among the approximately 4.4m records on the England, Wales and Northern Ireland database.</p><p>Scotland already destroys DNA samples taken during criminal investigations from people, who are eventually not charged or who are later acquitted.</p><p>The decision follows a lengthy legal challenge by two British men. Michael Marper, 45, was arrested in March 2001 and charged with harassing his partner, but the case was later dropped.</p><p>Separately, a 19-year-old named in court only as "S" was arrested and charged with attempted robbery in January 2001, when he was 12, but he was cleared five months later.</p><p>The men, both from Sheffield, asked that their fingerprints, DNA samples and profiles be destroyed. South Yorkshire police refused, saying the details would be retained "to aid criminal investigation".</p><p>They applied to the European court after their case was turned down by the House of Lords, which ruled that keeping the information did not breach human rights.</p><p>Shami Chakrabarti, the director of the human rights group, Liberty, which helped fund the case, said parliament should be allowed to debate new <a href="http://www.guardian.co.uk/politics/dna-database">DNA database</a> rules.</p><p>"This is one of the most strongly-worded judgments that Liberty has ever seen from the court of human rights," she said, arguing that the court had ensured "the privacy protection of innocent people that the British government has shamefully failed to deliver".</p><p>Smith, however, said existing laws would remain in place while ministers considered the judgment.</p><p>"DNA and fingerprinting is vital to the fight against <a href="http://www.guardian.co.uk/uk/ukcrime">crime</a>, providing the police with more than 3,500 matches a month, and I am disappointed by the European court of human rights' decision," she said.</p><p>"The government mounted a robust defense before the court and I strongly believe DNA and fingerprints play an invaluable role in fighting crime and bringing people to justice."</p><p>Chris Sims, the chief constable of Staffordshire police, who speaks on forensics for the Association of Chief Police Officers, said the ruling would have a "profound impact" on policing.</p><p>Analysis of 200,000 DNA samples retained on the database between 2001 and 2005, which would have to be destroyed under today's ruling, showed that 8,500 profiles had been linked to crime scenes, among them 114 murders and 116 rapes, said Sims.</p></div></div></div>[guardian.co.uk © Guardian News and Media Limited 2008]DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com1tag:blogger.com,1999:blog-7963172716739485356.post-1275086712516640232008-11-28T00:42:00.004-05:002008-11-28T01:00:17.222-05:00Who Will Watch the Watchers?<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWGqeVeIv7KWLKxqPxGI9SDzRktdn13BhEMeyBIEopDe1tgzPJiP4k2D3PxCNACRY4Iw3CRJ7A8OY8oJ7yL2rMoYvVVGQBQw-32__beMH7cuF-CDDFNBYnBqWpS5FNCEhJMF1P_qFR6qk/s1600-h/new+american+%3D+spy+chip.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 242px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWGqeVeIv7KWLKxqPxGI9SDzRktdn13BhEMeyBIEopDe1tgzPJiP4k2D3PxCNACRY4Iw3CRJ7A8OY8oJ7yL2rMoYvVVGQBQw-32__beMH7cuF-CDDFNBYnBqWpS5FNCEhJMF1P_qFR6qk/s320/new+american+%3D+spy+chip.jpg" alt="" id="BLOGGER_PHOTO_ID_5273581721528864434" border="0" /></a><br /><div style="text-align: center;"><span style="font-weight: bold;">Surveillance State I.D. - Implantable VeriChip Launches in Mexico</span><br /><div style="text-align: left;"><span style="font-style: italic;">Mexico's emerging surveillance state offers a sobering look into the future if the Power Elite's proposal for a 'continental security' perimeter becomes reality.<br /><br /></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKtUgiVAdTtaf2fY0LcN3RSWYHZPaXEIb9J6xFANlyXj5LWqcVJ_qcltWNl4CXrPHesubtS1UOxmtl4XQOMYfOcGpi2eaTApKYEIfLUdMMw5LgmfoHwhiPzq3WMekxRrwXY3ZLYhh83dk/s1600-h/page+1.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 270px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKtUgiVAdTtaf2fY0LcN3RSWYHZPaXEIb9J6xFANlyXj5LWqcVJ_qcltWNl4CXrPHesubtS1UOxmtl4XQOMYfOcGpi2eaTApKYEIfLUdMMw5LgmfoHwhiPzq3WMekxRrwXY3ZLYhh83dk/s320/page+1.jpg" alt="" id="BLOGGER_PHOTO_ID_5273584020866870210" border="0" /></a><span style="font-style: italic;"><br /></span><div style="text-align: center;"><span style="font-style: italic;"></span><br /><span style="font-style: italic;"></span></div><span style="font-style: italic;"><br /></span>Article in NEW AMERICAN Magazine Oct 04, 2004 Pages 8-15<span style="font-style: italic;"><br /></span></div></div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-18328097699716487642008-11-23T13:50:00.007-05:002008-11-23T14:02:36.761-05:00AND NOW THE MANCHURIAN MICROCHIP<div style="text-align: left;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_RcaNZnI0E1rsWG1BsFJvWX6W-22FBIP9nTscOoEqWbjCK6uKuuhWsGcVLwlMxyrWtxTI9psQzjlK0gUnZnpHN3JAB0hYAQbpWdhnb1DLIgEMSIEcFGjI5ngP6nnndXmDMIKg8vv7qgQ/s1600-h/timthumb.php.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 80px; height: 80px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_RcaNZnI0E1rsWG1BsFJvWX6W-22FBIP9nTscOoEqWbjCK6uKuuhWsGcVLwlMxyrWtxTI9psQzjlK0gUnZnpHN3JAB0hYAQbpWdhnb1DLIgEMSIEcFGjI5ngP6nnndXmDMIKg8vv7qgQ/s200/timthumb.php.jpg" alt="" id="BLOGGER_PHOTO_ID_5271928075080976226" border="0" /></a>The geniuses at Homeland Security who brought you hare-brained procedures at airports (which inconvenience travelers without snagging terrorists) have decreed that October is <span style="font-weight: bold;">National Cyber Security Awareness Month</span>.<br /></div><br />This means The Investigator — at the risk of compromising national insecurities — would be remiss not to make you aware of the hottest topic in U.S. counterintelligence circles: rogue microchips. This threat emanates from China (PRC) — and it is hugely significant. <p>The myth: Chinese intelligence services have concealed a microchip in every computer everywhere, programmed to “call home” if and when activated.</p> <p>The reality: It may actually be true.</p> <p>All computers on the market today — be they Dell, Toshiba, Sony, Apple or especially IBM — are assembled with components manufactured inside the PRC. Each component produced by the Chinese, according to a reliable source within the intelligence community, is secretly equipped with a hidden microchip that can be activated any time by China’s military intelligence services, the PLA.</p> <p>“It is there, deep inside your computer, if they decide to call it up,” the security chief of a multinational corporation told The Investigator. “It is capable of providing Chinese intelligence with everything stored on your system — on everyone’s system — from e- mail to documents. I call it Call Home Technology. It doesn’t mean to say they’re sucking data from everyone’s computer today, it means the Chinese think ahead — and they now have the potential to do it when it suits their purposes.”</p> <p>Discussed theoretically in high-tech security circles as “Trojan Horse on a Chip” or “The Manchurian Chip,” Call Home Technology came to light after the Defense Advanced Research Projects Agency (DARPA) launched a security program in December 2007 called Trust in Integrated Circuits. DARPA awarded almost $25 million in contracts to six companies and university research labs to test foreign-made microchips for hardware Trojans, back doors and kill switches — techie-speak for bugs and gremlins — with a view toward microchip verification.</p> <p>Raytheon, a defense contractor, was granted almost half of these funds for hardware and software testing.</p> <p>Its findings, which are classified, have apparently sent shockwaves through the counterintelligence community.</p> <p>“It is the hottest topic concerning the FBI and the Pentagon,” a retired intelligence official told The Investigator. “They don’t know quite what to do about it. The Chinese have even been able to hack into the computer system that handles our Intercontinental Ballistic Missile system.”</p> <p>Another senior intelligence source told The Investigator, “Our military is aware of this and has had to take some protective measures. The problem includes defective chips that don’t reach military specs — as well as probable Trojans.”</p> <p>A little context: In 2005 the Lenovo Group in China paid $1.75 billion for IBM’s PC unit, even though that unit had lost $965 million the previous four years. Three congressmen, including the chairman of the House Armed Services Committee, tried to block this sale because of national security concerns, to no avail. (The PRC embassy in Washington, D.C., maintains a large lobbying presence to influence congressmen and their staffs through direct contact.)</p> <p>In June 2007, a Pentagon computer network utilized by the U.S. defense secretary’s office was hacked into — and traced directly back to the Chinese PLA.</p> <p>A report presented to Congress late last year characterized PRC espionage as “the single greatest risk to the security of American technologies.” Almost simultaneously, Jonathan Evans, director- general of MI5, Britain’s domestic security and counterintelligence service, sent a confidential letter to CEOs and security chiefs at 300 UK companies to warn that they were under attack by “Chinese state organizations” whose purpose, said Mr. Evans, was to defeat their computer security systems and steal confidential commercial information.</p> <p>The Chinese had specifically targeted Rolls-Royce and Shell Oil.</p> <p>The key to unlocking computer secrets through rogue microchips is uncovering (or stealing) source codes, without which such microchips would be useless. This is why Chinese espionage is so heavily focused upon the U.S. computer industry.</p> <p>Four main computer operating systems exist. Two of them, Unix and Linux, utilize open-source codes. Apple’s operating system is Unix- based.</p> <p>Which leaves only Microsoft as the source code worth cracking. But in early 2004, Microsoft announced that its security had been breached and that its source code was “lost or stolen.”</p> <p>“As technology evolves, each new program has a new source code,” a computer forensics expert told The Investigator. “So the Chinese would need ongoing access to new Microsoft source codes for maintaining their ability to activate any microchips they may have installed, along with the expertise to utilize new hardware technology.”</p> <p>No surprise then that the FBI expends much of its counterintelligence resources these days on Chinese high-tech espionage within the United States. Timothy Bereznay, while still serving as assistant director of the FBI’s Counterintelligence Division, told USA Today, “Foreign collectors don’t wait until something is classified — they’re targeting it at the research and development stage.” Mr. Bereznay now heads Raytheon’s Intelligence and Information Systems division.</p> <p>The PRC’s intelligence services use tourists, exchange students and trade show attendees to gather strategic data, mostly from open sources. They have also created over 3,500 front companies in the United States — including several based in Palo Alto to focus on computer technology.</p> <p>Back in 2005, when the Chinese espionage problem was thought to be focused on military technology, then-FBI counterintelligence operations chief Dave Szady said, “I think the problem is huge, and it’s something we’re just getting our arms around.” Little did he know just how huge, as it currently applies to computer network security.</p> <p>The FBI is reported to have arrested more than 25 Chinese nationals and Chinese-Americans on suspicion of conspiracy to commit espionage between 2004 and 2006. The Investigator endeavored to update this figure, but was told by FBI spokesman William Carter, “We do not track cases by ethnicity.”</p> <p>Excuse us for asking. We may be losing secrets, but at least the dignity of our political correctness remains intact.</p> <p>Oh, and Homeland Security snagged comic icon Jerry Lewis, 82, trying to board a plane in Las Vegas with a gun — no joke.</p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaFHSXhvYBZ6LmF_5tvGGi1mMBuRnAdLQOccaW0mfMcgq9u9NEAv1QILypwWG5-Z08xt6_ZoGlzVtPROZBEJScljWX7zh7HSP7IMtaft1uSxOorWQ9R7KTqDOl6SFzYumxI1ReQE00Q-0/s1600-h/eringer_ret.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 166px; height: 166px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaFHSXhvYBZ6LmF_5tvGGi1mMBuRnAdLQOccaW0mfMcgq9u9NEAv1QILypwWG5-Z08xt6_ZoGlzVtPROZBEJScljWX7zh7HSP7IMtaft1uSxOorWQ9R7KTqDOl6SFzYumxI1ReQE00Q-0/s320/eringer_ret.png" alt="" id="BLOGGER_PHOTO_ID_5271928442760623330" border="0" /></a><em>Robert Eringer worked as a spy for the FBI for 10 years beginning in 1993. Robert was responsible for bringing American CIA Traitor Edward Lee Howard to capture which he wrote about in his book, <a href="http://www.amazon.com/Ruse-Undercover-Counterintelligence-Robert-Eringer/dp/1597971898">Ruse</a>. Robert now writes for the Santa Barbara News-Press where the article above was <a href="http://www.newspress.com/Top/Article/article.jsp?Section=LOCAL&Subsection=Columnists&ID=565387824908599370#emailStory">first featured </a>on the Manchurian Microchip.<br /></em> <em><br /><br /></em><div style="text-align: left;">[Daily Artisan.com]<br /></div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-19389119045078568452008-05-09T12:34:00.001-04:002008-05-09T12:34:37.575-04:00BB ISP got your BT?<div xmlns='http://www.w3.org/1999/xhtml'>Now that our Big Brother ISPs have begun throttling BitTorrent data packets, its easy to blame the ISP for any slowdown in the network regardless of the real reason. We can certainly get into a discussion about rights and throttling but until that issue gets through the courts, it seems to be a growing problem. <br/><br/>Now there is an easy way to rest easy at night by <a href='http://broadband.mpi-sws.mpg.de/transparency/bttest.php'>testing your broadband connection for throttling by your ISP</a>. This tool, called <a href='http://broadband.mpi-sws.mpg.de/transparency/'>Glasnost</a>, simulates BitTorrent data packets and measures the bandwidth compared to normal web usage. See the website for technical details.<br/><br/>Alternatively, there are also ways to <a href='http://lifehacker.com/software/bittorrent/stop-your-isp-from-throttling-bittorrent-speeds-295995.php'>stop your ISP from throttling your BitTorrent</a> in the first place.<br/><br/><a href='http://broadband.mpi-sws.mpg.de/transparency/bttest.php'>Glasnost</a> [via <a href='http://torrentfreak.com/test-does-your-isp-slow-down-bittorrent-traffic-080507/'>TorrentFreak</a> via <a href='http://lifehacker.com/388097/determine-if-your-isp-is-throttling-your-bittorrent-traffic'>LifeHacker</a>]</div>Zachhttp://www.blogger.com/profile/16574472415700100845noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-32948151123690573012008-04-08T12:24:00.006-04:002008-12-08T18:30:23.915-05:00Googling your backyard<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_Ihqwe25DeRo/R_ueLz7_J5I/AAAAAAAAAG0/VW8n-EPyaXE/s1600-h/streetview.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;" src="http://4.bp.blogspot.com/_Ihqwe25DeRo/R_ueLz7_J5I/AAAAAAAAAG0/VW8n-EPyaXE/s200/streetview.jpg" alt="" id="BLOGGER_PHOTO_ID_5186913321604818834" border="0" /></a><br />Apparently, Google can (and will) go onto your property and photograph your yard/house/pool/trampoline. This has begun happening all over the country as Google "accidentally" drives their little camera-laden Google Street View vehicles all over your town and occasionally up your driveway. If this happens to you, you can sue Google to remove the images but that is only if you find out before others have seen it and copied the pictures.<br /><br />My point in posting this is that if Google can get into your backyards, who else can?<br /><br />See links below for a creepy view of some poor sap's home and yard.<br /><br />[<a href="http://gizmodo.com/377265/google-street-view-enjoys-private-driveway">Gizmodo</a> via <a href="http://www.thesmokinggun.com/archive/years/2008/0407081google1.html" target="_blank">smoking gun</a> via <a href="http://consumerist.com/377125/googles-street-view-is-all-up-in-your-driveway-looking-at-your-basketball-hoop" target="_blank">consumerist</a>]Zachhttp://www.blogger.com/profile/16574472415700100845noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-55361191129122685072008-04-07T13:09:00.003-04:002008-04-07T13:20:42.083-04:00RFID Link CollectionCheck out this <a href="http://portal.eluma.com/collections/default.aspx?id=7E7C1EC2-35D9-48D0-90B9-41D1E238AFFC">collection of RFID resources</a>. The collection was created using <a href="http://www.eluma.com">Eluma</a>, a social bookmarking application and RSS reader. Eluma is currently in private Beta but I have <a href="http://aardwolf.eluma.com/%7Econtent/invitations/retrieve.php?guid=47ebc77f90587">invitations</a>.Zachhttp://www.blogger.com/profile/16574472415700100845noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-11380294863109907142008-04-07T12:47:00.002-04:002008-04-07T13:17:37.240-04:00Comcast Wants to Put Cameras In Your Home<a href="http://www.switched.com/category/tv/"></a><a href="http://www.switched.com/2008/03/26/comcast-wants-to-put-cameras-in-your-home"><img src="http://www.blogsmithmedia.com/www.switched.com/media/2008/03/838153_87329823-eye.jpg" alt="" align="right" border="0" height="406" hspace="4" vspace="4" width="304" /></a><br />Conspiracy theorists are going to have a field day with this story. In fairness, so will just about everybody else. We hope.<br /><br />Comcast is experimenting with camera technology. More specifically, it trying out technology that turns cable boxes into camera-equipped devices that would utilize body-form-recognition as a means to provide custom-tailored service, and, of course, custom tailored advertising. The boxes would be able to tell who is in the room based on the shape of their body, thus tailoring programming to fit their specific desires and security settings (when children are involved). Facial recognition is not in the works as of yet.<br /><br />We should be clear: This is all in the experimental phase. There has been no consumer testing and Gerard Kunkel, Comcast's senior VP of user experience, stresses that any final decision is predicated on the boxes providing more to the viewer than just precision advertising.<br /><br />Custom Tailored. Security. Efficient. Your New Best Friend. Now You Can Leave the Kids At Home With Super Cable Nanny! Those are hypothetical buzz-words and -phrases Comcast will most likely lay on in hearty layers if and when it begins to roll out this new technology.<br /><br />Honestly, what is your immediate gut reaction when you hear that a massive corporation might want to place cameras that actually track your movements in your own home? We won't say what we think. Trust your gut reaction and don't let any amount of mediocre advertising sway you.<br /><br />[<a href="http://newteevee.com/2008/03/18/comcast-cameras-to-start-watching-you/" target="_blank">NewTeevee</a>, <a href="http://www.switched.com/2008/03/26/comcast-wants-to-put-cameras-in-your-home">Switched</a>]DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-26851134722359746262008-04-07T12:39:00.005-04:002008-12-08T18:30:24.072-05:00Tiny Camera Implants Turning Insects Into Spies<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyQzOQuylMvxQBzzc1U5u5Snecjh_l_3dBqOxl3BseCZmEyk7Ptxc2xcA0ZRydtCNPBjzsrx6vttNTZtxXK08EalftjOqesShoMvIV0aY-HjL4MXAmj9jbvD_GM3l_IVh0A-y_3Dx22Ps/s1600-h/spyflydm0503_468x287.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyQzOQuylMvxQBzzc1U5u5Snecjh_l_3dBqOxl3BseCZmEyk7Ptxc2xcA0ZRydtCNPBjzsrx6vttNTZtxXK08EalftjOqesShoMvIV0aY-HjL4MXAmj9jbvD_GM3l_IVh0A-y_3Dx22Ps/s320/spyflydm0503_468x287.jpg" alt="" id="BLOGGER_PHOTO_ID_5186544452947409938" border="0" /></a><span style="font-size:100%;">According to this week's <a href="http://www.newscientist.com/home.ns">New Scientist</a>, the future of spying may rest in the hands (or legs) of insects and rodents. In an <a href="http://www.dailymail.co.uk/pages/live/articles/technology/technology.html?in_article_id=527328&in_page_id=1965&ito=1490">attempt to build the ultimate super(small)spy</a>, moths, beetles, rats, pigeons and sharks have been installed with electrodes, batteries, and even video cameras.<br /><br />"[A moth] may look like an innocent visitor, irresistibly drawn to the light in your room, but it could actually be a spy -- one of a new generation of cyborg insects with implants wired into their nerves to allow remote control of their movement."<br /><br />These mechanized animals (read: cyborgs) have plenty of advantages over traditional robots. Sharks, moths and rats, for example, have an amazing sense of smell that allows them to detect the faintest traces of chemicals. And if humans can figure out how to hide the controls within the creature's bodies ... well, they would become perfect spy.<br /><br />[<a href="http://www.switched.com/2008/03/09/tiny-camera-implants-turning-everyday-insects-into-spies-on-the/">switched</a>, </span><a target="_blank" href="http://www.dailymail.co.uk/pages/live/articles/technology/technology.html?in_article_id=527328&in_page_id=1965&ito=1490">DailyMail</a>]DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-58951609001847041702008-04-07T12:13:00.000-04:002008-04-07T12:22:29.713-04:00Aaron Russo and Nicholas Rockefeller coversation about RFID Chip.<object width="425" height="355"><param name="movie" value="http://www.youtube.com/v/j7se4gFTCys&hl=en"></param><param name="wmode" value="transparent"></param><embed src="http://www.youtube.com/v/j7se4gFTCys&hl=en" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"></embed></object>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com1tag:blogger.com,1999:blog-7963172716739485356.post-82590957580333544752008-04-07T11:03:00.002-04:002008-04-08T13:00:49.394-04:00Live Inconvenient or Die<dl><dt>I would rather be exposed to the inconveniences attending too much liberty than to those attending too small a degree of it. </dt><dd class="author"><b><a href="http://www.blogger.com/quotes/Thomas_Jefferson/">Thomas Jefferson</a></b>, <i>to Archibald Stuart, 1791</i><br /><i>3rd president of US (1743 - 1826)</i> </dd></dl>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com0tag:blogger.com,1999:blog-7963172716739485356.post-50141982599968106632008-03-24T12:41:00.000-04:002008-12-08T18:30:24.297-05:00Who's Watching Us?Who's Watching Us? Who's tracking our lives at every possible second? How are they doing it? Most importantly, why?<br />What sort of future is rapidly upon us?<br />What are our rights and how are they standing up to this 'Brave New World' we find ourselves becoming a part of?<br /><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheowc4qPSlnCrjQvX9nvhDmwD2MLVuRd342UHKBJ6HMch1G8a5kB2KybBCFucgxv7re7Xo0mdhJfGahh4tKUGXR4cdqT7z3oJZbey6qCW5saR05j0OH6dTxU-LbAlhl1tQVNvInFRNbuU/s1600-h/eye2.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 107px; height: 92px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheowc4qPSlnCrjQvX9nvhDmwD2MLVuRd342UHKBJ6HMch1G8a5kB2KybBCFucgxv7re7Xo0mdhJfGahh4tKUGXR4cdqT7z3oJZbey6qCW5saR05j0OH6dTxU-LbAlhl1tQVNvInFRNbuU/s320/eye2.JPG" alt="" id="BLOGGER_PHOTO_ID_5181352395832294402" border="0" /></a></div><br /><div style="text-align: center;"><br /></div>DarkAlleyShooterhttp://www.blogger.com/profile/08757969088152060584noreply@blogger.com1