4 star Cyber General doesn’t know what an IP Address is - #NWO
And this is one of the guys that’s at the head of America’s cyber defense team.
See Also: (BeforeItsNews) – BATFE Violates The Law Again – Read More Here
Also: (BladeReport) – Military Coup Could Oust Obama: Former White House Speechwriter – Read More Here
Also: (ActivistPost) – DHS imports wartime surveillance technology to U.S. border – Read More Here
Also: (NewsWithViews) – Civil War Has Begun: America is Fatally Deceived – Read More Here
(BeforeItsNews) – After 9/11, the United States government created the Department of Homeland Security to prevent future acts of terrorism and deal with other domestic issues. Now in order to keep doing such, the agency is asking for 450 million hollow point bullets.
The DHS has signed off on an “indefinite delivery” from defense contractors ATK that will include, for some reason, nearly 500 million high-power ammunition for .40 caliber firearms. The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States.
“We are proud to extend our track record as the prime supplier of .40 caliber duty ammunition for DHS,” reads an official statement from Ron Johnson, ATK’s president of Security and Sporting, who adds that his group will also be giving up weaponry to the DHS subdivision of ICE, or Immigrations and Custom Enforcement.
While ammunition itself seems not too unreasonable of a request by a major federal entity that emphasizes domestic durability and safeguarding the country from coast to coast, the choice — and quantity — of its hollow point order raises a lot of questions about future plans for the DHS. ATK says they won their contract with the US government by being able to provide them with 450 million HST bullets, which it describes as “the next generation in high performance duty ammunition.”
What does that mean, exactly? On their website, the contractor claims that the ammunition is specifically designed so that it can pass through a variety of obstructions and offers “optimum penetration for terminal performance.” Or, in other words, this is the kind of bullet designed to stop any object dead in its tracks and, if emptied into the hands of the DHS a few hundred million times, just might do as much.
Since its inception, the Department of Homeland Security has not only absorbed ICE and other government entities, but has arguably extended its powers much more broadly than many had imagined. Under the recently authorized Trespass Bill, H.R. 347, protesters that allegedly disrupt occurrences acknowledged by the DHS of being a National Special Security Event will be charged with a federal crime. As the DHS gains more and more ground in fighting terrorism domestically, the US at the same time has turned the tables to make its definition of terrorist way less narrow. With any American blogger or free thinking on the fringe of what the government can go after under H.R. 347, or the National Defense Authorization Act that allows for the indefinite detention of US citizens without charge, the DHS could just be blasting through what’s left of its budget to make sure that its roster of agents across the country can get in their target practice over the next few years.
Of course, the government might just want to ensure that each one of those agents is more than able to assassinate Americans not just around the globe, but on their own soil. After all, for all of those angsty alleged Americans engaged in terrorism abroad, the US has the largest military in the history of the world to deal with them. In that case, they could argue that it only makes sense to equip their armed forces at home as well.
#DHS preparing for domestic war?
The US Department of Homeland Security and the Immigrations and Customs Enforcement Office have placed a massive order for ammunition. The two departments are asking for 450 million rounds of bullets to be delivered in a time-frame of five years. The contractor, Alliant Techsystems, was awarded the contract and will produce .40 caliber high-performance bullets to the agencies. The order has many wondering why would DHS and ICE need so many bullets. David Seaman, journalist and host of the DL Show, helps us answer why the order was placed.
Two out of the three members follow this blog and they frequently reblog my post on the OccupyWallStreet blog.
The Twitter account @OccupyWallStNYC is also being monitored. It just so happens that they follow me as well.
Since this blog is arguably the most frequently updated and popular OWS-related Tumblr, I have reason to believe this blog is also being monitored and that could explain the frequent reportings.
If I find anything new, I will post an update. You can read the document here.
New Counterorrism Guidelines Gives Authorities Vast Access to Private Info of Innocent Americans - #NWO
On Thursday, U.S. Attorney General Eric Holder signed expansive new guidelines for terrorism analysts, allowing the National Counter Terrorism Center (NCTC) to mirror entire federal databases containing personal information and hold onto the information for an extended period of time—even if the person is not suspected of any involvement in terrorism. (Read the guidelines here).
Despite the “terrorism” justification, the new rules affect every single American. The agency now has free rein to, as the New York Times’ Charlie Savage put it, “retrieve, store and search information about Americans gathered by government agencies for purposes other than national security threats ” and expands the amount of time the government can keep private information on innocent individuals by a factor of ten.
From the New York Times:
The guidelines will lengthen to five years — from 180 days — the amount of time the center can retain private information about Americans when there is no suspicion that they are tied to terrorism, intelligence officials said. The guidelines are also expected to result in the center making more copies of entire databases and “data mining them” using complex algorithms to search for patterns that could indicate a threat. (emphasis ours)
Journalist Marcy Wheeler summed the new guidelines up nicely saying, “So…the data the government keeps to track our travel, our taxes, our benefits, our identity? It just got transformed from bureaucratic data into national security intelligence.”
The administration claims that the changes in the rules for the NCTC—as well as for the Office of the Director of National Intelligence (DNI), which oversees the nation’s intelligence agencies—are in response to the government’s failure to connect the dots in the so-called “underwear bomber” case at the end of 2009, yet there was no explanation of how holding onto innocent Americans’ private data for five years would have stopped the bombing attempt.
Disturbingly, “oversight” for these expansive new guidelines is being directed by the DNI’s “Civil Liberties Protection Officer” Joel Alexander, who is so concerned about Americans’ privacy and civil liberties that he, as Marcy Wheeler notes, found no civil liberties concerns with the National Security Agency’s illegal warrantless wiretapping program when he reviewed it during President George W. Bush’s administration.
As other civil liberties organizations have noted, the new guidelines are reminiscent of the Orwellian-sounding “Total Information Awareness” program George Bush tried but failed to get through Congress in 2003—again in the name of defending the nation from terrorists. The program, as the New York Times explained, sparked an “outcry” and partially shut down Congress because it “proposed fusing vast archives of electronic records — like travel records, credit card transactions, phone calls and more — and searching for patterns of a hidden terrorist cell.”
The New York Times reported, the new NCTC guidelines “are silent about the use of commercial data — like credit card and travel records — that may have been acquired by other agencies,” but information first obtained by private corporations has ended up in federal databases before. In one example, Wired Magazine found FBI databases contained “200 million records transferred from private data brokers like ChoicePoint, 55,000 entries on customers of Wyndham hotels, and numerous other travel and commercial records.” The FBI would be one of the agencies sharing intelligence with the NCTC.
Despite Congress’ utter rejection of the “Total Information Awareness” program (TIA) in 2003, this is the second time this month the administration has been accused of instituting the program piecemeal. In his detailed report on the NSA’s new “data center” in Utah, Wired Magazine’s James Bamford remarked that the new data storage complex is “the realization” of the TIA program, as it’s expected to store and catalog “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches.”
Unfortunately, the new NCTC guidelines are yet another example of the government using the word “terrorism” to infringe on the rights of innocent Americans. Aside from the NSA’s aforementioned warrantless wiretapping program, we have seen the Patriot Act overwhelminglyused in criminal investigations not involving terrorism, despite its original stated purpose. As PBS Frontline’s Azmat Khan noted in response to the new guidelines, investigative journalist Dana Priest has previously reported how “many states have yet to use their vast and growing anti-terror apparatus to capture any terrorists; instead the government has built a massive database that collects, stores and analyzes information on thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.”
This problem has been well documented for years, yet Congress and both the Bush and Obama administrations have continued to use terrorism as a justification for expansive laws, and Americans’ constitutional rights have become collateral damage.
Official List Of Words Feds Monitor On Social Networking Sites - #NWO #DHS #MIC #Tyranny
The Feds have been forced to release their social network monitoring manual, which contains the list of words the government watches on social media and news sites.
Earlier the Huffington Post reported on the Feds have been forced to give up their list of words they monitor on Facebook, Twitter, and comments being posted on news articles so I compiled that list below.
Homeland Security Manual Lists Government Key Words For Monitoring Social Media, News
Ever complain on Facebook that you were feeling “sick?” Told your friends to “watch” a certain TV show? Left a comment on a media website about government “pork?”
If you did any of those things, or tweeted about your recent vacation in “Mexico” or a shopping trip to “Target,” the Department of Homeland Security may have noticed.
In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.
The 39-page “Analyst’s Desktop Binder” used by the department’s National Operations Center includes no-brainer words like “”attack,” “epidemic” and “Al Qaeda” (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as “exercise,” “drill,” “wave,” “initiative,” “relief” and “organization.”
These terms and others are “broad, vague and ambiguous” and include “vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters,” stated the Electronic Privacy Information Center in letter to the House Homeland Security Subcommittee on Counterterrorism and Intelligence.
The manual was released by the center a week after Homeland Security officials were grilled at a House hearing over other documents obtained through a Freedom of Information Act lawsuit that revealed analysts were scrutinizing online comments that “reflect adversely” on the federal government. Mary Ellen Callahan, the chief privacy officer for the Department of Homeland Security, and Richard Chavez, director for the National Operations Center, testified that the released documents were outdated and that social media was monitored strictly to provide situational awareness and not to police disparaging opinions about the federal government. On Friday, Homeland Security officials stuck by that testimony.
A senior Homeland Security official who spoke to The Huffington Post on Friday on condition of anonymity said the testimony of agency officials last week remains “accurate” and the manual “is a starting point, not the endgame” in maintaining situational awareness of natural and man-made threats. The official denied Electronic Privacy Information Center’s charge that the government is monitoring dissent. The manual’s instruction that analysts should identify “media reports that reflect adversely on DHS and response activities” was not aimed at silencing criticism but at spotting and addressing problems, she added.
Source: The Huffington Post
The Official List – Using these words online will put you in the crosshairs of Big Brother’s multi-billion dollar spy machine
DNDO (Domestic Nuclear
Domestic nuclear detection Emergency management
Maritime domain awareness
Disaster medical assistance
Organized crime Gangs
State of emergency
Bomb (squad or threat)
HAZMAT & Nuclear
Biological infection (or
Hazardous material incident
Powder (white) Gas
Health Concern + H1N1
Foot and Mouth (FMD)
Human to human
Human to Animal
Center for Disease Control
Drug Administration (FDA)
Pork World Health Organization
(WHO) (and components)
Viral Hemorrhagic Fever
CIKR (Critical Infrastructure
& Key Resources)
WMATA Airplane (and derivatives)
Body scanner Electric
Failure or outage
Southwest Border Violence
El Paso Fort Hancock
MS13 or MS-13
Cartel de Golfo
Narco banners (Spanish
Al Qaeda (all spellings)
Improvised explosive device IED (Improvised Explosive
FARC (Armed Revolutionary
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
PLF (Palestine Liberation
PLO (Palestine Liberation
Suicide attack Suspicious substance
AQAP (AL Qaeda Arabian
AQIM (Al Qaeda in the
Brush fire Ice
Tsunami Warning Center
Sleet Mud slide or Mudslide
Emergency Broadcast System
DDOS (dedicated denial of
Denial of service
Cyber Command 2600
Cain and abel
Cyber terror Hacker
Read the Deparment of Homeland Security Media Monitoring Desktop Reference
Watch: Congressional Hearing Department of Homeland Security’s monitoring of social media
video of Rep. Patrick Meehan (R-Pa.), chairing a hearing of the House Homeland Security Subcommittee on Counterterrorism and Intelligence about the Department of Homeland Security’s monitoring of social media.
[Edit: Fuck You, Feds! Your Scare Tactics Don’t Work On Our Critical Mass! ..Your Full Spectrum Dominance Will Never Occur!]
"shut the hell up"…. "dissenters hate freedom"….
(WIBC.com photo: Liz Thomas)
Less than a week after public safety officials launched a text alert system at the Indianapolis Motor Speedway, they announced new technology Monday to further improve safety and emergency response efforts at large events.
The Division of Homeland Security will begin piloting a new system on race day that is designed to bring a “common operating picture” to all of the public safety employees working at the track.
The technology includes the use of 4G smartphones, tablet devices and integrated incident tracking software called “Command Core.”
"With Command Core, we will be able to stream real-time video and pictures of emergency calls and utilize detailed mapping and 3D modeling of facilities for strategic and tactical public safety planning," Ballard said.
The idea is to test the data system and implement it in time for the 2012 Super Bowl. The ultimate goal is to be able to use the technology during every large event or natural disaster in Indianapolis.
A document posted online by WikiLeaks reveals there were strategy discussions regarding the adoption of a “North American Union” – called the North American Initiative in this case – at the ambassadorial level in the United States government.
The concept of a North American Union largely has been ridiculed by many in government and media. The Wikipedia entry on North American Union calls it a “theoretical economic union” that has “been the subject of various conspiracy theories.”
However, WND has built an extensive library of reports that document progress toward the idea, and best-selling author Jerome Corsi’s book, “The Late Great USA,” shows how the Security and Prosperity Partnership, an agreement signed in 2005 by President George W. Bush, threatens American sovereignty.
The WikiLeaks document was uncovered by investigators with Americans for Legal Immigration, and the organization reports they “appear to confirm an incremental and covert plan within the highest levels of the American and Canadian governments to accomplish deeper ‘North American Integration,’ while keeping most average citizens in the dark and bypassing the constitutions of the existing three sovereign nations of America, Canada and Mexico.”
ALIPAC spokesman William Gheen told WND, “This is the smoking gun. This is not conjecture. This is a high-ranking member of the U.S. government who created this document.”
The document, from “a secret 2005 U.S. embassy cable from Ottawa signed by then-Ambassador Paul Cellucci,” states:
An incremental and pragmatic package of tasks for a new North American Initiative (NAI) will likely gain the most support among Canadian policymakers. Our research leads us to conclude that such a package should tackle both ‘security’ and ‘prosperity’ goals. This fits the recommendations of Canadian economists who have assessed the options for continental integration. While in principle many of them support more ambitious integration goals, like a customs union/single market and/or single currency, most believe the incremental approach is most appropriate at this time, and all agree that it helps pave the way to these goals if and when North Americans choose to pursue them.
In the document, released April 28, Cellucci “expounds upon a well researched and refined plan to mostly replace the existing borders of sovereign nations with some kind of privacy-invading biometric ‘security perimeter,’ where the borders of the nations will still stand, but information will be exchanged on all citizens in the nations, thus creating a super state law enforcement effort to manage security,” according to ALIPAC.
ALIPAC’s report said, “The document specifically states that Cellucci and his fellow conspirators fear the U.S. could wake up and secure the borders against contagious diseases and terrorism. He points out that financial interests in Canada fear U.S. attempts to protect citizens from terrorism or pandemics and could interfere with some financial interests in Canada.”
The document states:
Even with zero tariffs, our land borders have strong commercial effects. Some of these effects are positive (such as law enforcement and data gathering), so our governments may always want to keep some kind of land border in place… The risk that business will be obstructed at the border by discretionary U.S. actions, such as measures to defend against terrorism or infectious disease, in addition to growing congestion, have become major risks to the economy, inhibiting investment in Canada.
According to ALIPAC, “Here we have a man who has sworn an oath to uphold the Constitution of the United States of America and the people who pay his exorbitant salary and expenses with their hard earned taxes and who is taking the side of financial interests that cannot be bothered by dead Americans killed by Mexican flu pandemics and other diseases, rampaging armies of illegal alien marauders, or the lethal terrorists among them.”
The organization warned, “The document is very clear about moving slowly and incrementally and not attempting to arouse public suspicions by making a big move all at once.”
Part of the document:
The group also concluded the document is consistent with plans for the “North American Community” under its various names that previously have come from the Council on Foreign Relations as well as the writings of Robert Pastor of American University.
"Some Americans who are new to these issues may be asking what this has to do with the topic of illegal immigration?" ALIPAC wrote. "The nonenforcement of America’s existing constitution and federal immigration laws is facilitating this North American Integration, North American Community, North American Union plan.
"By not adequately enforcing America’s existing immigration and border laws, and by assisting millions of illegal aliens with everything from credit cards to bilingual voice systems demanding we ‘press one for English,’ an invading economic army has been brought to Americans’ doorsteps," the report said.
"While we have documented that illegal aliens are already voting in mass numbers in probably every state, the populist political uprising of Americans, partially reflected in the tea party movement, was stalled west of the Mississippi in the 2010 elections where the largest illegal alien populations resided, yet no investigations or charges are being pursued.
"If the plans to make illegal aliens new legal voters via the Dream Act or Comprehensive Amnesty become reality, then the North American Integration has been accomplished and any political resistance by American patriots will be overridden by the new illegal alien voting block," the report said.
Gheen cited the launch of the idea with the meeting of President George W. Bush, Mexican President Fox and Canadian Prime Minister Martin in 2005, to create a “free flow of people, goods, and services” across the continent.
He noted, “The most recent release from the White House was part of an agreement crafted in secret as well to create this so called ‘perimeter,’ and instead of identifying terrorists as Islamic extremists, invading illegal immigrants, or forces from outside of America or Canada who might attack, it reads, ‘We intend to cooperate to identify, prevent, and counter violent extremism in our two countries. By working cooperatively on research, sharing best practices, and emphasizing community-based and community-driven efforts, we will have a better understanding of this threat and an increased ability to address it effectively.’”
WND reported at the time that Obama and Canadian Prime Minister Stephen Harper took a major step toward erasing the border with their bilateral declaration.
In that ceremony, Obama and Harper bypassed Congress to sign on the basis of their executive authority a declaration that put in place a new national security vision defined not by U.S. national borders but by a continental view of a “North American perimeter.”
By signing the declaration, the Obama administration implemented without congressional approval a key initiative President Bush began under the Security and Prosperity Partnership of North America, moving the United States and Canada beyond the North American Free Trade Agreement, commonly known as NAFTA, toward a developing North American Union regional government.
The declaration signed by the two heads of state and titled “Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness,” was described as “For Immediate Release” on the websites of the White House and the Canadian chief executive.
Harper followed Obama’s lead in signing the declaration as a form of executive order, deciding to bypass the Canadian parliament, much as Obama had decided against taking a proposed bilateral “Beyond the Border” declaration to Congress for prior review and approval.
The decision to declare a continental perimeter for the United States and Canada, designed to effectively combine the two nations in mutual national security and economic efforts, affirms the Obama administration’s intent to implement the key objectives of the Security and Prosperity Partnership of North American in a way that avoids the type of public scrutiny and criticism that dogged President George W. Bush after he openly declared his plans with the SPP.
The Obama and Harper administrations’ use of a low-key methodology to pursue continental political integration was further confirmed in Canada by the Toronto Star. The paper disclosed a 14-page confidential public relations document circulated within the Canadian government that recommended the talks between Obama and Harper keep “a low profile” in the months leading to last Friday’s signing of the bilateral declaration.
WND has reported since 2006 that a blueprint published in 2005 by the Council on Foreign Relations titled “Building a North America Community” called for the establishment of a common security perimeter around North America by 2010 to facilitate the free movement of people, trade and capital between the three nations of North America.
American University’s Robert Pastor, co-chair of the CRF blue ribbon committee that authored “Building a North American Community,” wrote in 2001 the book “Toward a North American Community.”
He called for creation of a North American Commission, a North American Parliament and a North American Court on Trade and Investment.
The language of the “Beyond the Border Declaration” easily could have been taken almost verbatim from the CFR report or Pastor’s book.
The 2005 CFR report “Building a North American Community,” called on page xvii of the foreword for the “establishment by 2010 of a North American economic and security perimeter, the boundaries of which would be defined by a common external tariff and an outer security perimeter.”
1. The tactics unelected globalist business leaders, bureaucrats and taxpayer-funded academics are using to lead to the merger of the United States with Mexico and Canada
2. How the state of Texas is seizing millions of acres of privately owned land so foreign investors can cash in on a NAFTA “super-highway” from Mexico to the Canadian border.
3. How China, through its proxies in Mexico, plans to bring the world’s sole superpower to its knees economically – without firing a shot.
WND previously reported that the Obama administration replaced the content of the SPP website, spp.gov, under the title “Commerce Connect,” which announces its purpose as “a one-stop shop for information, counseling and government services that can help U.S. businesses around the country transform themselves into globally competitive enterprises.”
Now, the Obama administration has made the spp.gov website totally inoperative.
WND frequently has reported, beginning in 2006, that critics have charged the SPP was intended to implement a plan to produce a North American Union composed of the United States, Mexico and Canada.
The SPP in the administration of President George W. Bush appeared designed to replicate the steps taken in Europe over a 50-year period following the end of World War II to transform an economic agreement under the European Common Market into a full-fledged regional government, operating as the European Union, with its own currency, the euro, functioning as the sole legitimate currency in what has become known as “the eurozone.”
The concern about the SPP has been that the North American Free Trade Agreement, or NAFTA, could be evolved into a regional government with a regional currency, the amero, designed to replace the U.S. dollar, the Mexican peso and the Canadian dollar.
WND repeatedly had reported that the North American integration plan likely would proceed incrementally under the Obama administration, largely below the radar, even after the SPP was declared “dead” by one of its chief architects, Pastor.
WND documented that on Nov. 30, DHS Secretary Janet Napolitano signed a "Trusted Traveler" agreement with Mexico, thereby implementing a primary objective of the SPP Transportation Policy working group under President Bush. The agreement opens the U.S. border to approximately 84 million Mexican citizens by issuing biometric “Trusted Traveler” cards that Mexicans entering the U.S. can swipe through ATM-like “Global Entry” kiosks at some 20 international airports in the United States.
WND also reported that the U.S. State Department is moving to expand the definition of a “North American perimeter” to define a continental border around the United States that would include Mexico as well as Canada.
The relevant document with Mexico is a March 23 State Department memo titled “United States-Mexico Partnership: A New Border Vision.” The document that appears to be a companion document to the Beyond the Border Declaration signed Obama signed with Harper on Feb. 4.
US authorities have resumed “Operation In Our Sites” and have seized several domain names associated with copyright infringement or counterfeit related crimes. Among the new targets are two sites that linked to copyrighted films hosted on third party streaming sites such as megavideo.com and veoh.com. Homeland Security’s Immigration and Customs Enforcement (ICE) has yet to officially announce the new operation.
Over the past several months a series of domain name seizures by the Department of Justice (DOJ) and Immigration and Customs Enforcement (ICE) made headlines across the Internet.
Under the flag of “Operation In Our Sites” the authorities shut down a dozen file-sharing and streaming sites and many more accused of selling counterfeit goods.
Today ICE continued the operation with a 4th round, and the first one since February this year. Although the authorities are yet to give an official comment on the new seizures, TorrentFreak was able to confirm the following targets:
The first two domains are accused of copyright-related offenses, but did not host any copyrighted films themselves. Both Re1ease.net and Watchnewfilms.com linked to popular movie streaming sites such as Veoh.com and Megavideo.com. The rest of the domains appear to be connected to sales of counterfeit goods.
The new targets were most likely put forward to ICE by movie industry groups. In April of this year ICE director John Morton admitted that his organization was acting based on “tips from industry representatives,” among others.
The authorities are also aware of the fact that the domain seizures themselves are not really an effective tool. As pointed out before, more than half of the piracy-related domains that were seized by Operation In Our Sites simply continued under a different name.
Morton replied to this critique by emphasizing that the seizures also act as “public education about pirating.”
To quash allegedly copyright infringing sites more effectively U.S. lawmakers introduced the PROTECT IP Act last week. Aside from domain seizures, the new bill will also make it possible to block sites on an ISP level, to censor search engines, and to cut funding of allegedly copyright-infringing websites.
TorrentFreak is closely monitoring developments in Operation in Our Sites 4 and if any additional domains are seized we will update this report accordingly.
On September 12, 2001, President George W. Bush invited members of Congress and the media for a meeting in the cabinet room of the White House. The mood was understandably anxious, somber: The World Trade Center lay in rubble, the Pentagon had a hole gouged into it and shock and awe had settled over the United States. One of the most extraordinary periods of American history – what would come to be known as the “Post 9-11 Era” – was beginning.
The president gravely laid out the situation and the steps his administration would take to secure the homeland, but during the course of the meeting he also made this significant declaration: “We will not allow this enemy to win the war by changing our way of life or restricting our freedoms.”
Those were heroic words of principle and patriotism in a traumatic time, but history would show that government’s reaction to the terrorist threat was the exact opposite than the protection of freedoms. Instead, government rushed in with a massive plan to create a surveillance society, intending to watch and document every action by the American people as a means of ultimate security.
First, Congress passed the Patriot Act, giving law enforcement powers to circumvent many Constitutional guarantees to personal privacy and home security. Then Congress created the Department of Homeland Security (DHS). The department immediately became an army of more than 170,000 employees by combining twenty two existing federal agencies, including the
Border Patrol, Coast Guard, Secret Service, FEMA, Immigration and Naturalization Service, Customs Service, Animal and Plant Health Inspection, Federal Protective Service, FBI’s Computer Incident Response Center and several more lesser agencies of the same type. In the middle of this rush for security, Congress created the Transportation Security Agency (TSA). Also born in this Post 9/11 era were state fusion centers with the intention of combining federal, state and local law enforcement agencies into instant response teams, intending to eliminate bureaucratic overlap and red tape, in case of another terrorist attack or Hurricane Katrina-type disasters.
Finally, Congress passed the REAL ID Act, promoted as an attempt to standardize the process and format for creation of all state drivers’ licenses to achieve increased security. Proponents argued that, under REAL ID, we will know that anyone carrying a drivers’ license is legal in this country and therefore not a threat.
What most Americans do not know is that the blue print for REAL ID did not originate in the United States, but in the backrooms of a United Nations organization called the International Civil Aviation Organization (ICAO). That organization is tasked with the goal of creating a once-size fits all international identification system using massive data banks that contain individual biometric information on nearly everyone in the world. Biometrics is defined as measurement of the body. One might correctly think of fingerprinting, iris scans and facial recognition as biometrics.
In compliance to this goal, REAL ID mandates a certain picture quality for all drivers’ licenses. Those photos are to comply with the ICAO’s Document 9303 biometric format. Your photo taken by a local DMV is run through special software which measures and analyzes the unique identifiable characteristics of your face. The process results in a unique numeric code which identifies a person according to facial measurements. In other words, under REAL ID, using the adopted standard of the ICAO, your face is reduced to a number code, a number which is read by a computer and be tracked by surveillance cameras worldwide.
Why would the United States agree to implement such a system? What happened to the promise that we would not let the terrorists change our way of life? How did the United States move from a free society, bent on preserving our freedoms in a dangerous terrorist-driven world to one of total surveillance over the actions of every citizen? What was the unseen hand that led to such decisions?
The international focus on drivers’ licenses through REAL ID came as a result of plans for international biometric passports. Passports, of course, are a control device of travelers both coming and going through US borders. Discussion regarding the use of E-Passports started soon after 9/11. It was not until the Enhanced Border Security and Visa Entry Reform Act of 2002 that our federal government put in place the framework for the issuance of E-Passports. E-Passports utilize both biometric technology and RFID (Radio Frequency Identification) technology.
Focusing on passports, however, was about to create an international problem for the US government that would force it to accelerate and expand its surveillance plans, leading to a global surveillance system beyond what most in Congress intended.
Using the excuse that the US government wanted to learn as much about Al- Qaeda as possible, the US began to dictate to foreign governments that they also needed to implement E-Passports. Without them, said the US, their citizens would not be able to enter the US. In addition, the US wanted those nations to provide all information they had on Al-Qaeda members.
Meanwhile, the United Nations set up a committee named simply “Al-Qaeda.” Again, the stated goal was for all nations to cooperate in an Al-Qaeda clearing house of information. Each government was to provide the names of the members of Al-Qaeda that the respective governments were aware of.
What became obvious to many in our government was, if we expected information about citizens of other countries our government was also going to have to “ante up” and provide information about our citizens to the other nations. This is when things started to get out of control. Global information sharing was seen as a necessity. All “chips” were on the table. For the system to work the personal and sensitive information, including the biometrics of all citizens in all countries, had to be made available to intelligence and law enforcement people around the world.
Other nations resented the United States telling them that they must supply information about their citizens if the US wasn’t willing to do the same. The US was forced to comply with its own dictates. And so the drive was on for the creation of an international surveillance system. REAL ID, while not recommended by the 9/11 Commission, became the center piece for the drive to document each and every American and placed their biometric records in international data bases.
The Real ID Act of 2005 was signed into law in May, 2005. The rulemaking process took roughly 2 1/2 years to be completed. During that 2 1/2 years over six hundred groups and organizations came out against the law for a variety of reasons. These groups covered a broad political spectrum from the far right to the far left. Religious organizations representing all major religions spoke out against the Real ID Act.
Among the reasons for such overwhelming opposition is that Real ID is an unfunded federal mandate; the federal government intervening in the issuance of state driver’s licenses; the unfettered power Real ID provides the Secretary of the Department of Homeland Security; a variety of privacy concerns; First Amendment religious concerns of which many were by Christian evangelical ministries; the state driver’s license would become a de facto national identification card; and the requirement that each driver’s license applicant would provide biometric samples.
In order for a state to be in compliance with the law, each state has 18 “benchmarks” they must complete or satisfy the Department of Homeland Security that the state is working towards completing the individual benchmarks. Opposition has been strong as 25 states, either as a result of law or resolution, opposed the Real ID Act. Because of the opposition, the Real ID Act implementation date has been postponed twice. However, proponents are determined to force implementation anyway and DHS demands that states comply by May, 2011.
If enforced, Americans will find what the saying “under government’s thumb” really means. Biometric documents will be required for nearly every action Americans take. A digital/electronic footprint will be the only way to access bank accounts; accessing transportation (at any level); purchase of goods and services; obtaining employment; and so forth. Every one of these actions will be stored in databanks and transferred to international databanks for storage.
Along with REAL ID, more legislation is pending in Congress to create even more control, all sold as just another way to keep us secure. One piece calls for a “National Worker’s Identification Card” and Senator Lieberman wants a new biometric social security card. If these proposals are passed into law and Real ID or anything else similar is in place it will be “game over”. Employers and retailers will have to have biometric readers and RFID (Radio Frequency Identification) scanners.
In addition, American law enforcement is being changed and with it, America’s unique justice system is being changed too. Once law enforcements mission was to catch criminals after a crime was committed. And even those captured were protected as“innocent until proven guilty.” That Constitutionally-protected rights made American justice unlike any other in the world. It has been one of the cornerstones of American freedom and security over freedoms and the less-certain future they offer.
We must remember that the stated goal for the total surveillance system has been that the world would be as one, carrying the same documents to assure everyone is equal, everyone is known, and everyone is legitimate. Under the system, say the proponents, security can be guaranteed.
So now the surveillance system is nearly fully in place. What are the results? Are we safer? The fact is, with all of the biometric data bases being established, RFID chips, Closed Circuit TVs, Automatic License Plate Readers, National Security Letters, State Fusion Centers, the Patriot Act, and the establishment of the behemoth Department of Homeland Security, we are not any safer than we were on the day before 9/11.
Why? First, while the government increases surveillance over every individual in he name of protection from terrorists, our borders remain wide open. Anyone wanting to do harm to the United States is able to simply walk into the country and be aided by an entire network providing shelter, money, weapons, and access to American programs for money, schools and jobs. They can illegally purchase counterfeit birth certificates and social security cards and obtain state drivers’ licenses in any state. Only three states have the ability to authenticates birth certificates.
Programs like E-Verify, sold as a way to guarantee that only legal residents get jobs, actually aid those entering illegally. It makes the Social Security Number the most valuable commodity in the nation – a valuable prize. That makes it profitable for underground criminal networks to obtain and produce them. Terrorists networks have the means and the money to lead that effort. In addition, a study commissioned by DHS and performed by Westat reported that E-Verify is wrong more than it is right when dealing with a person in our country illegally is vetted out. In these situations E-Verify is wrong 54% of the time and right only 46% of the time.
And there is one more fact that renders the entire surveillance effort worthless in the fight against terrorism. Back to those E-Passports and the US demand for other nations to comply. The whole
Under REAL ID and the growing surveillance society, however, law enforcements mission is emerging to be one of “crime prevention” before it occurs. The only way such a policy could work is for government to be able to observe our every action, including monitoring phone calls, opening mail, monitor our financial transactions, monitor who we associate with and monitor our travel. The government has programs to achieve each and every one of these things. DHS and National Security Agency (NSA) have both engaged in domestic spying. The Defense Department had a program called “Total Information Awareness” (TIA) that was designed to combine and access all of the video cameras now in place in nearly every store, shopping mall and parking lot to monitor every move we make. Now on the back burner, TIA could be reactivated at any time. All that is missing is the final requirement that all Americans must carry in their pockets the document tying them into the system – the REAL ID drivers’ license.
Once fully implemented, REAL ID means a “one-size fits all” policy, leading to the end of Constitutionally- protected First and Fourth Amendment rights. Proponents believe “safety” trumps “freedom” and any cost. With full implementation of REAL ID, government will finally have the laws, technologies and the ability governments throughout history have always sought to exercise total control over the people. Yet many Americans still refuse to be alarmed, seeking safety program depends on honest, reliable governments producing honest, reliable, secure documents on their own citizens. They don’t.
Many Moslem countries in the Middle East consider the US to be their enemy.Pakistan’s government, for one, while pretending to be our ally, is full of government workers who are either friends or members of Al- Qaeda. They have helped hide Al-Qaeda leaders since the inception of the war on terrorism. It is a known fact by US intelligence agents. Any effort made by the US to coordinate strategy with such governments fails because plans are immediately shared with the enemy by such government workers. The internal politics of these countries put the governments in an untenable position. If the leaders of these countries are perceived to be working with U.S. intelligence officials there is blowback against them for working with the “Infidels” of the United States. As a result, information from these nations, to this day, is at best questionable and unreliable.
To rely on such countries to provide honest documentation for citizens by way of passports or other identification is pure folly. It is easy for government employees to provide Al- Qaeda operatives all the “legitimate” documentation they need to travel freely inside the surveillance bubble that has been established to supposedly catch them.
Any honest observer or government leader dealing with the situation on a daily basis has to know the truth – that REAL ID and its fellow programs are not about protecting us in the war on terror. So what is the real purpose? What are we really doing?
The fact is Real ID is designed to enroll every citizen into a single global system of identification and financial control. Doubt that – then consider these words of Robert Mocny speaking for DHS when he said, “information sharing is appropriate around the world,” and DHS plans to create a “Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations.”
Meanwhile, Julian Ashborn speaking as the Chairman of the International Biometric Agency said, “What information do governments share? With whom is my data shared and why?” All of these questions need to be addressed by an agency with global powers”
These officials are telling openly telling us what they plan – global governance. Americans are just not listening. The truth is we are not safe. And such a system will never make us safe. But what we have done in the name of safety is to create an international surveillance system that destroys the unique American system of liberty and justice, “harmonizing” us into the same totalitarian system that controls so much of the rest of the world.
It can be stopped now- before it is fully implemented.
But once REAL ID is enforced in every state through compliant drivers’ licenses, it will be too late. Every American who cherishes their Constitutionally- guaranteed rights have until May of this year to demand that their state governments stand strong and continue to oppose compliance with this international straight jacket. Our protests postponed it for several years. We must do it again.
Call now or understand that, once in place, there will be no way for this generation to pass freedom to the next. REAL ID is that great a threat.
© 2011 Tom DeWeese - All Rights Reserved
from the touchy,-huh? dept
Apparently, the folks at Homeland Security are not at all pleased with the very, very simple Firefox extension, called MAFIAAfire, that negates ICE’s domain seizures, by automatically rerouting users to alternate domains. Apparently, DHS demanded that Mozilla take the extension down from its listing of Firefox extensions claiming that the add-on “circumvented” DHS’s seizure orders. Thankfully, Mozilla didn’t just fold, but instead left it up and sent DHS a list of questions concerning the request. The list of questions is really fantastic, as it goes way beyond the direct request to really get to the heart of the questionable nature of ICE’s activity with domain seizures:
To help us evaluate the Department of Homeland Security’s request to take-down/remove the MAFIAAfire.com add-on from Mozilla’s websites, can you please provide the following additional information:
1. Have any courts determined that MAFIAAfire.com is unlawful or illegal in any way? If so, on what basis? (Please provide any relevant rulings)
2. Have any courts determined that the seized domains related to MAFIAAfire.com are unlawful, illegal or liable for infringement in any way? (please provide relevant rulings)
3. Is Mozilla legally obligated to disable the add-on or is this request based on other reasons? If other reasons, can you please specify.
4. Has DHS, or any copyright owners involved in this matter, taken any legal action against MAFIAAfire.com or the seized domains, including DMCA requests?
5. What protections are in place for MAFIAAfire.com or the seized domain owners if eventually a court decides they were not unlawful?
6. Can you please provide copies of any briefs that accompanied the affidavit considered by the court that issued the relevant seizure orders?
7. Can you please provide a copy of the relevant seizure order upon which your request to Mozilla to take down MAFIAAfire.com is based?
8. Please identify exactly what the infringements by the owners of the domains consisted of, with reference to the substantive standards of Section 106 and to any case law establishing that the actions of the seized domain owners constituted civil or criminal copyright infringement.
9. Did any copyright owners furnish affidavits in connection with the domain seizures? Had any copyright owners served DMCA takedown notices on the seized domains or MAFIAAfire.com? (if so please provide us with a copy)
10. Has the Government furnished the domain owners with formal notice of the seizures, triggering the time period for a response by the owners? If so, when, and have there been any responses yet by owners?
11. Has the Government communicated its concerns directly with MAFIAAfire.com? If so, what response, if any, did MAFIAAfire.com make?
It’s always nice to see some organizations not just roll over when the government comes calling. Kudos to Mozilla for not just refusing to takedown MAFIAAfire, but for also asking serious questions of DHS. Of course, DHS has refused to respond at all…
#realness - (RussiaToday) – Are the methods the US is using, namely technically training activists in the Middle East, underminding the sovereignty of the countries there? Who is behind the Soros Foundation, Twitter and Facebook? Who is making up the flash mobs, allegedly organized in Egypt, Tunisia and Libya, where the Internet connection has been shut since the riots broke out? Wayne Madsen, investigative journalist, is sharing his opinion with RT on the issue.
How much of your freedom are you willing to give up in the name of your personal safety?
That question is prompted by the latest news about the Transportation Security Administration, which has reportedly been contemplating expanding its controversial X-ray body-scanning program from airports to public events, mass transit and possibly even the streets where you live.
According to documents obtained by the nonprofit Electronic Privacy Information Center, the TSA in 2006 began planning pilot programs that, if ever fully implemented, would expand its reach into the everyday lives of American citizens.Aldawsari: Why was the alleged W-slay plotter even here ?
The idea was to develop a credible “response package” to a threat like the 2004 Madrid train bombings and the attack on the London Underground the following year by Muslim terrorists.
Phase One was tested in February 2006 at the Exchange Place PATH station in Jersey City, using metal detectors and X-ray machines. Phase Two tried out “in several locations” video-surveillance cameras, still photography and whole-body imaging.
Still other projects bruited involved mobile vans equipped with backscatter X-ray scanners to detect weapons and explosives in cars and on pedestrians.
Do we really want to go down this road?
The Fourth Amendment states explicitly: “The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated.”
Hard to square that with the mission of the Homeland Security Department and its intrusive TSA, which treat every American equally — as a potential criminal and terrorist.
Meanwhile, the TSA has now told its 40,000 airport screeners that they have the right to unionize on a limited basis — defeating the Bush administration’s original insistence that the DHS should be nonunion in order to ensure maximum flexibility and accountability.
In a politically correct attempt at perfect egalitarianism, we’ve created a bureaucratic monster. And, like all bureaucracies, it really has only one imperative — not defending the homeland, but protecting itself and expanding its reach, in order to justify its $56 billion budget.
It doesn’t matter whether the administration is Republican or Democratic. It doesn’t matter who’s president. Poorly conceived and hastily created in the aftermath of 9/11, the leviathan DHS — with more than 200,000 employees, it’s the third-largest Cabinet department — is a conceptual and practical disgrace to the American tradition of ordered liberty.
This isn’t to say we should have no defense against the very real threats in an asymmetrical war against radical Islam. And it’s also true that the Islamic threat may be changing from immigrant jihadis to American-born agents, like Maj. Nidal Hasan, who murdered 13 people at Fort Hood, Texas, in 2009.
But it’s absurd to argue that random “militias,” white-supremacist gangs or other groups pose a significant effect to the republic, much less grandmas in wheelchairs and yeshiva students.
The farce that is our security policy will come back to haunt us unless we shake off the PC shackles and start taking more proactive security measures.
And that starts with whom we let into our country. We know, for example, that the 9/11 hijackers were largely from Saudi Arabia, some of them fast-tracked under the now-discontinued Visa Express program. We also know that the kingdom is the world’s foremost exporter not only of oil, but also of radical Wahhabism.
Last month, in a story that got almost no notice, a Saudi Muslim named Khalid Ali-M Aldawsari, here on a student visa, was arrested by the FBI and charged with attempted use of a “weapon of mass destruction” — a chemical improvised-explosive device — in a plot to kill “the tyrant” George W. Bush. What was this man doing in our country?
The place to stop terrorists is during what should be a rigorous, need-based visa process in countries in the Arab and Muslim world, not when they’re in Texas buying Hazmat suits.
If that offends certain “sensibilities,” tough. The impossibly perfect can’t be the enemy of the good enough for right now — not as long as the war continues.
It’s time to get the DHS and the TSA out of their defensive crouch. It’s past time to expand our forward perimeter to our embassies and consulates, instead of waiting for the enemy to strike here.
And unless the Constitution no longer means anything, it’s way past time to insist that our government stop treating us as potential bombers and murderers.
Michael Walsh, a former associate editor of Time, is the author (writing as David Ka hane) of “Rules for Radical Conservatives.”