National I.D. Cards

Big Brother is watching you

The United States of Greater Israel, Obedient to the Master Race under the Universal Noahide Laws, HJR 104, Public Law 102-14, controlled by the Noahide Supreme Court of Justice

Israel Sanhedrin Supreme court

 

 

September 11 was quickly followed by calls from some lawmakers and business leaders for a more robust national identification system: ID cards that possess sophisticated biometric data, making them harder to forge than today's driver's licenses. Privacy advocates are strongly opposed, arguing that such cards, while enabling the government to track individuals and access personal data, would do little to separate the innocent citizen from the walking security threat. For now, the Bush administration is cool to the idea, but it's not hard to envision the Department of Homeland Security re-examining the concept if further terrorist attacks occur. More than 30 countries, from Italy to Malaysia, have already introduced "smart" ID cards. If you're eventually issued a national card, it will likely incorporate several of the technologies shown here, combined to make the card readable by both high- and low-tech devices.

1. Your USID number

Most logically your Social Security number. Although the federal government has rejected using the SS card as an ID card, the number is already used by the IRS. If a card is introduced, it's a good guess the Department of Homeland Security would manage it, possibly issuing different classes of cards for citizens, green card holders, and others.

2. Optical Memory Strip

An optical memory data strip (like a small CD laminated onto the card) locks in 4MB of read-only data, which can be read by an optical scanner. The strip can contain a digitized image of a fingerprint and a photo, along with essential personal data such as previous addresses, mother's maiden name, and, optionally, medical data such as allergies. Room remains for scanned documents, X rays, or digital signatures. LaserCard of Mountain View, California, adds an embedded hologram.

3. Photograph

Standard printing technology, which lays down ink on the card material, easily succumbs to skilled forgers. One step up is laser engraving: Machines permanently etch a photo into the card material, usually a polymer such as polycarbonate. It's virtually impossible to erase or alter a laser-engraved image without leaving telltale marks. But a trained person is still needed to examine the card for sophisticated tampering. Another step up: Integrate a radio frequency identification (RFID) device, which would automate the authentication process. An RFID chip and antenna would be placed beneath the photo. If the image is altered, the chip and antenna are disturbed, and a portable reader will register a problem.

4. Smart card technology

With the addition of an integrated circuit microprocessor, the card can perform data manipulation and run cryptographic algorithms. The processor makes it possible to limit the amount of data any one official can access. For example, an ER doctor could view medical information and enter data about treatment (if the card's data storage device is read-write capable), but could not see security-related data (such as a traveler's flight history, or a non-citizen's visa status) that an airport or INS official might require. But how secure are smart cards? Detailed instructional hacking sites can be found on the Web, many focusing on European cards. And the more data on a card, the more valuable the card becomes to an identity thief.

5. Internal Memory Strip

Currently manufactured only by UltraCard of Los Gatos, California, this rewritable internal strip can store 20MB of data, roughly the capacity of 14 floppy disks—essentially giving the card a (tiny) hard drive. The capacity may soon grow by a factor of 10, according to the manufacturer. A high-capacity device could store rich biometric data such as several fingerprints, iris scans, face scans, heartbeat characteristics, or DNA sequences. In a relatively simple application, law enforcement officials access the card data using a portable reader and match it to the biometrics of the person presenting the card. Or an entry control system might be developed that automatically matches, for example, the iris scan on the card with the cardholder's iris.

6. 2-D Bar Code

This low-tech info coding could be used by officials who don't have more sophisticated optical reading devices. A big step up from the simple 20-byte-capacity bar code you see on cereal boxes, the 2-D bar code stores information in vertical and horizontal lines—up to 2KB or more of data, potentially including text, a photo, and a limited amount of biometrics. These bar codes are already used on driver's licenses in several states, generally to code the same information that's on the face of the card. The technology is virtually tamperproof. The main problem: relatively small capacity per inch of card real estate. Datastrip Inc. of Exton, Pennsylvania, says it can cram 2.8KB of data into a space the size of a conventional thin magnetic strip. The company also sells a portable reader with an integrated fingerprint identifier.

WHOSE DATABASE, ANYWAY?

The biggest challenge for a national ID system is ensuring the accuracy of the information used to build a database of names, biometrics, and the like. There are more than 200 million state driver's licenses in the country, representing the largest collection of data of its kind. The most pressing question: How accurate are these databases? How easy is it to obtain a license fraudulently? As the American Association of Motor Vehicle Administrators points out, al Qaeda terrorists used licenses to build U.S. identities. In January the AAMVA proposed beefing up the system by establishing uniform standards for licenses, coordinating data between states, and improving security and biometrics. A national ID initiative could be a springboard for this effort.


"We are on the verge of a global transformation. All we need is the right major crisis and the
nations will accept the "New World Order."

David Rockefeller

Was the right crisis the staged World Trade Center Crashes?

In response to the tragic events of Sept. 11, 2001 there has been renewed interest in the creation of national ID cards. Larry Ellison, head of Oracle Corporation, the California based software company, has called the development of a national identification system and offered to donate the technology to make this possible. He proposed ID cards with embedded digitized thumbprints and photographs of all legal residents in the U.S. Proposals for a national ID card are also now being considered by the UK Home Secretary, David Blunkett. 

Fore runner of the Mark?

 

 

XXXXX DRUDGE REPORT XXXXX SUNDAY SEPT 23 2001 20:02:37 ET XXXXX

BUSH CONTEMPLATES NATIONAL ID CARD FOR ALL CITIZENS

**Exclusive**

A highly controversial option has emerged for use in fighting terrorism in the United States: A national ID card which would be issued to every citizen.

A proposal for the creation of a national ID card was presented to President Bush in recent days, top government sources tell the DRUDGE REPORT.

The ID card plan was included in a classified briefing outlining steps the nation can take to limit exposure to terror attacks.

Bush briefly discussed the ID card option with British Prime Minister Tony Blair, according to insiders.

MORE

George Bush: The Hitler Project (Pt. 1)
    by ALEX CONSTANTINE

In October 1942, ten months after entering World War II, America was preparing its first assault against Nazi military forces. Prescott Bush was managing partner of Brown Brothers Harriman. His 18-year-old son George, the future U.S. President, had just begun training to become a naval pilot.

On Oct. 20, 1942, the U.S. government ordered the seizure of Nazi German banking operations in New York City which were being conducted by Prescott Bush. Under the Trading with the Enemy Act, the government took over the Union Banking Corporation, in which Bush was a director.

The U.S. Alien Property Custodian seized Union Banking Corp.'s stock shares, all of which were owned by Prescott Bush, E. Roland `` Bunny '' Harriman, three Nazi executives, and two other associates of Bush. The order seizing the bank `` vests '' (seizes) `` all of the capital stock of Union Banking Corporation, a New York corporation, '' and names the holders of its shares as:

E. Roland Harriman -- 3991 shares [chairman and director of Union Banking Corp.



1933

 

 January 30 Adolph Hitler becomes Chancellor of Germany. He is the leader of the National Socialist German Workers Party and commander of the SA, the Storm Troopers (founded in 1922). 

February 27 The Reichstag building is set on fire by secret order of Hitler's Chief of Propaganda, Joseph Goebbels. A young Dutchman, identified as a Communist, is arrested and charged with setting the fire. 

February 28 The very next day, Hitler persuades President Hindenburg to sign Article 48, an "emergency" decree authorizing Hitler to suspend all civil rights, arrest (and execute) any suspicious person. A reign of terror ensued in which thousands (communists, socialists, labor union leaders) were arrested and sent to prison. To maximize Nazi influence, the non-Nazi press was outlawed. 






Politics

Constitutional infringements cited

Gov. Siegelman trying to 'manipulate news coverage,' says lawyer for Mobile Register

10/02/01

By JEFF AMY and JEB SCHRENK
Staff Reporters

MONTGOMERY -- The Mobile Register accused Gov. Don Siegelman's administration Monday of violating its civil rights by refusing to answer questions from Eddie Curran, one of the newspaper's reporters.

"The Register considers this to be a serious infringement of its constitutional rights under the First and 14th Amendments of the Constitution of the United States," Ed Sledge, a Mobile lawyer for the Register wrote to two top administration officials. "Further, Governor Siegelman's attempt to choreograph and manipulate news coverage in this manner is causing irreparable harm to the Register."

Sledge also wrote that Siegelman should be more understanding because of a documented incident in which he lost his temper. Sledge cited a news article describing a 1989 episode when Siegelman was attorney general and members of Mothers Against Drunk Driving said he cursed at them during a meeting. Among the reasons cited by the administration for cutting off communication with Curran is because he cursed at a spokesman in the governor's office in July.

According to a news account of the 1989 incident, which quoted women at the meeting, Siegelman in his outburst uttered variations of the same two obscenities that Curran used. An attorney who served under Siegelman denied Monday that Siegelman uttered one of the words in the 1989 meeting.

Last week, Siegelman said Curran had "used the worst language, profane language, that has ever been used."

The First Amendment guarantees the right to a free press. Under the 14th Amendment, individual citizens can sue states for violating their civil rights. Gregg Leslie, the legal defense director of the Reporters Committee for Freedom of the Press said the Register might be able to claim the administration is violating parts of the 14th Amendment because it is denying equal protection and due process to Curran and the Register.

"The state must offer each citizen equal protection and yet the state has decided to deny Eddie Curran information that other citizens will be getting," said Mike Marshall, the Register's editor.

___________________________________________________________________________________________________

 

Back to Hitler's reign of Terror

March 5 Hitler receives the support of the German voters in Reichstag (Germany's Parliament) elections. 

March 24 Now under Hitler's control, the Reichstag essentially grants Hitler total control by empowering him to make laws for the Reichstag.

 March 20 The first Nazi concentration camp is opened at an old powder factory near Dachau. The camp is to be used to incarcerate thousands of political opponents of the regime. April 1 Hitler declares a one-day boycott of Jewish businesses. Signs are posted all over Germany saying, "German people, defend yourselves! Do not buy from Jews." 

April 7 Forced retirement of all non-Aryan civil servants (with the exception of the military). 

April 21 German law prohibits kosher butchering.  At this time, there are approximately 500,000 Jews living in the Third Reich. This is less than 1 percent of the total population. 

 May 2 The Nazis seized control of the German labor unions, arrested their leaders, confiscated union property and established a Nazi-controlled labor union, The German Labor Front. German workers lost the right to strike. 

May 10 Under orders from Goebbels, Hitler's Minister of Propaganda and Popular Enlightenment, Nazi gangs raided the Berlin Library and burned truckloads of Germany's very best literary works. June Hitler secured the cooperation of the Vatican by guaranteeing the liberties of the Catholic Church in Germany. In return, the Vatican promised to stay out of German politics. 

June 22 The Social Democrat Party is outlawed, making Hitler's Nazi Party the only political party in Germany. 

July 14 Hitler is empowered to revoke German citizenship for those considered a threat to the government or "undesirable" to the government. 

August 29 Official confirmation that the Nazis are sending Jews to concentration camps on a variety of charges from "consorting with German girls," to "imitating the Nazi salute." 

______________________

BBC NEWS

Compulsory ID cards 10-2-2001

Before Monday, Prime Minister Tony Blair and Home Secretary David Blunkett had confirmed they were looking at plans for mandatory ID cards.

 

_____________________________________________________

 

 

 

U.S. CONCENTRATION CAMPS
FEMA AND THE REX 84 PROGRAM

over 600 prison camps in the United States, all fully operational and ready to receive prisoners. They are all staffed and even surrounded by full-time guards, but they are all empty. These camps are to be operated by FEMA (Federal Emergency Management Agency) should Martial Law need to be implemented in the United States. The current foreseeable event which will see the implementation of the use of these camps is the coming of the New World Order, led by the Shadow Government.

The Rex 84 Program was established on the reasoning that if a mass exodus of illegal aliens crossed the Mexican/US border, they would be quickly rounded up and detained in detention centers by FEMA. Rex 84 allowed many military bases to be closed down and to be turned into prisons.

Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the coming police state and thus will head up all operations. The Presidential Executive Orders already listed on the Federal Register also are part of the legal framework for this operation.

The camps all have railroad facilities as well as roads leading to and from the detention facilities. Many also have an airport nearby. The majority of the camps can house a population of 20,000 prisoners. Currently, the largest of these facilities is just outside of Fairbanks, Alaska. The Alaskan facility is a massive mental health facility and can hold approximately 2 million people.

 

 

This shows the North Eastern section of the U.S., and shows a closer look, where U.N. troops are located in North Western Montana, and a few other states as well.

 

The Family Alliance

 __________________________________________________

Back to Hitler

 

October 14 Hitler withdraws from the League of Nations and the Versailles disarmament pact. At the same time, Hitler announces the dissolution of the Reichstag. 

1934
 

 

June 30 In a massive "blood purge," known as "the Night of the Long Knives,"Hitler arranged for the Gestapo to murder Ernst Roehm, the leader of Germany's political left and head of the SA. At least 1,000 additional political enemies were included in this purge. 

July 13 Heinrich Himmler, Chief of the SS, assumes command of all Nazi concentration camps. Himmler and his "black shirts" are now responsible for policing Germany. 

August 2 President Paul von Hindenburg dies. And with his death the Weimar Republic is officially dead. August 3 Now completely in control of the reigns of power, Hitler declares himself both President and Chancellor of the Third Reich and Commander-in-Chief of the Military. Hitler now had totalitarian dictatorial power.

July 22 

Effective January 1, 1939, all Jews must carry a special identification card.

 

November 23

 Reich law requires Jews in Poland to wear the yellow Star of Chiun and Moloch  (Baal)  their god.

 

Amos:5:26:

 But ye have borne the tabernacle of your Moloch and Chiun your images, the star of your god, which ye made to yourselves.

 

__________________________________________

Bin Laden's family link to Bush
by PETER ALLEN, Daily Mail

 

In summer 1971, Osama and Salem Bin Laden enjoyed a holiday in Sweden with some of their 55 brothers and sisters.

Yet within a few years, the two teenagers' lives had taken stunningly different turns.

As the world knows to its cost, Osama embraced Islamic fundamentalism and 30 years later was named the world's most wanted man. He is prime suspect in the murder of nearly 7,000 in the worst ever terrorist atrocities in the U.S. earlier this month.

Incredibly, Salem went on to become a business partner of the man who is leading the hunt for his brother. In the 1970s, he and George W Bush were founders of the Arbusto Energy oil company in Mr Bush's home state of Texas.

Mr Bush was not long out of Business School when he started the company in 1978.

Salem watched it grow into a hugely successful business until his death in a microlight plane crash in Texas in 1983.

As he built his own business empire, Salem Bin Laden had an intriguing relationship with the president-to-be.

In 1978, he appointed James Bath, a close friend of Mr Bush who served with him in the Air National Guard, as his representative in Houston, Texas.

It was in that year that Mr Bath invested $50,000 (about £34,000) in Mr Bush's company, Arbusto. It was never revealed whether he was investing his own money or somebody else's.

There was even speculation that the money might have been from Salem. In the same year, Mr Bath bought Houston Gulf Airport on behalf of the Saudi Arabian multimillionaire. Three years ago, Mr Bush said the $50,000 investment in Arbusto was the only financial dealing he had with Mr Bath.

 

New book on NSA sheds light on secrets
U.S. terror plan called Cuba invasion pretext


By Scott Shane and Tom Bowman
Sun Staff
Originally published April 24, 2001

 

WASHINGTON - U.S. military leaders proposed in 1962 a secret plan to commit terrorist acts against Americans and blame Cuba to create a pretext for invasion and the ouster of Communist leader Fidel Castro, according to a new book about the National Security Agency.

"We could develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington," said one document reportedly prepared by the Joint Chiefs of Staff. "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," the document says. "Casualty lists in U.S. newspapers would cause a helpful wave of indignation."

The plan is laid out in documents signed by the five Joint Chiefs but never carried out, according to writer James Bamford in "Body of Secrets." The new history of the Fort Meade-based eavesdropping agency is being released today by Doubleday.

NSA regularly picks up the conversations of suspected terrorist financier Osama bin Laden, says Bamford, and has monitored Chinese and French companies trying to sell missiles to Iran. He provides new details about an Israeli attack on a Navy eavesdropping ship in 1967, suggesting that the sinking was deliberate. And he reveals the loss of an "entire warehouse" full of secret cryptographic gear to the North Vietnamese in 1975, at the end of the Vietnam War.

Bamford, a former investigative reporter for ABC News who wrote "The Puzzle Palace" about the NSA in 1982, said his new book is based mostly on documents obtained through the Freedom of Information Act or found in government archives. "NSA never handed me any documents," he said. "It was a question of digging."

He said he was most surprised by the anti-Cuba terror plan, code-named Operation Northwoods. It "may be the most corrupt plan ever created by the U.S. government," he writes.

The Northwoods plan also proposed that if the 1962 launch of John Glenn into orbit were to fail, resulting in the astronaut's death, the U.S. government would publicize fabricated evidence that Cuba had used electronic interference to sabotage the flight, the book says.

A previously secret document obtained by Bamford offers further suggestions for mayhem to be blamed on Cuba.

"We could sink a boatload of Cubans en route to Florida (real or simulated). ... We could foster attempts on lives of Cubans in the United States, even to the extent of wounding in instances to be widely publicized," the document says. Another idea was to shoot down a CIA plane designed to replicate a passenger flight and announce that Cuban forces shot it down.

Citing a White House document, Bamford writes that the idea of creating a pretext for the invasion of Cuba might have started with President Dwight D. Eisenhower in the last weeks of his administration, when the plan for an invasion by Cuban exiles trained in the United States was hatched. Carried out in April 1961, soon after Kennedy became president, the Bay of Pigs invasion proved a fiasco. Castro's forces quickly killed or rounded up the invaders.

Army Gen. Lyman L. Lemnitzer, chairman of the Joint Chiefs, presented the Operation Northwoods plan to Kennedy early in 1962, but the president rejected it that March because he wanted no overt U.S. military action against Cuba. Lemnitzer then sought unsuccessfully to destroy all evidence of the plan, according to Bamford.

_________________________

But who is the leading Advocate pushing this I.D

Other than Bill & Hillary Clinton

Oracle Corporation

Make ID cards compulsory

 urges Oracle boss, by Andrew Orlowski, The Register, Sept. 24, 2001

Make ID cards compulsory, urges Oracle boss
By Andrew Orlowski in San Francisco
Posted: 24/09/2001 at 08:11 GMT
Larry Ellison has offered help in the creation of a National ID card for the United States by donating Oracle software.

Ellison told San Francisco TV channel KPIX that the US needed a national database containing biometric information on its citizens to prevent terrorism:-

"We need a national ID card with our photograph and thumbprint digitized and embedded in the ID card,'' he said, the San Jose Mercury reports.

That a Silicon Valley CEO should call for an extension of Federal powers would normally be considered remarkable: the tech elite here are typically unanimous in calling for less government intervention. But Ellison is simply looking after the interest of his shareholders: when existing markets are soft, the onus is to create new demand and new markets for his wares. And there would be downstream benefits for Oracle of course, in the form of consulting and future applications.

Ellison's comments are the most visible push for a Stateside National ID card we've heard: the idea has received next to no press here in the past fortnight, but rather more in the United Kingdom, where the issue was pre-emptively raised by Home Secretary David Blunkett.

Oracle Chief's Proposal Raises Constitutional, Feasibility Issues,

 by Paul Rogers and Elise Ackerman, Mercury News, Sept. 24, 2001

National ID card idea prompts doubts

Oracle chief's proposal raises constitutional, feasibility issues

BY PAUL ROGERS AND ELISE ACKERMAN
Mercury News

Oracle CEO Larry Ellison's call this weekend for a national ID card system has ignited a raging debate over an issue that has simmered in the United States since the 1930s.

By offering to donate the software to create a database of Americans' fingerprints, Ellison lent new immediacy to a powerful but intrusive approach to fighting terrorism. But experts said Monday that -- Ellison's technology credentials notwithstanding -- the idea might not be feasible on a national scale.

And despite polls showing the public supporting some type of national ID card, civil liberties groups also called Ellison's proposal an unacceptable intrusion into privacy.

Known as biometrics, the technology behind the idea already exists. Systems digitally scan fingerprints or handprints, and are being used by security officials at some casinos, courts and airports for employees to gain access to restricted areas.

``It might be worth investigating more widely, but I'm not sure that kind of a system would have prevented the tragedy,'' said Bill Rathburn, former Dallas police chief and head of security at the 1996 Atlanta Olympic Games. ``There are a lot of people who are potential terrorists who have never done anything wrong. I just don't think that system would pick them all up.''

Wonder who is a lot of people who are potential terrorist?

He said adding sky marshals to planes, conducting better baggage searches and building more-secure cockpits might be most effective.

Others worry it chips away at the Constitution.

``I'm not going to be critical of his good will in attempting it,'' said former Republican Rep. Tom Campbell, now a Stanford University law professor. ``However, I strongly oppose a national ID card. If you have an ID card, it is solely for the purpose of allowing the government to compel you to produce it. This would essentially give to the government the power to demand that we show our papers. It is a very dangerous thing.''

Could be abused

The card could be used by police to track travel movements or to single out people with unpopular views or certain ethnic backgrounds for surveillance, Campbell said. (sounds like me)

Other questions remained unanswered Monday.

Despite more than 150 requests for interviews from media outlets following a story in the Mercury News on Sunday outlining the idea, Ellison did not elaborate.

``We're putting together a response,'' said Jennifer Glass, an Oracle spokeswoman.

Oracle, based in Redwood City, is the world's largest maker of database software. The company's earliest customers included the CIA. Ellison, Oracle's founder, is one of the world's richest people, worth an estimated $15 billion.

The flamboyant tech leader made his proposal Friday night in an interview about the economy with KPIX-TV, based in San Francisco.

``We need a national ID card with our photograph and thumbprint digitized and embedded in the ID card,'' Ellison told KPIX anchor Hank Plante.

``When you're walking into an airport and you say that you are Larry Ellison, you take that card and put it in a reader and you put your thumb down and that system confirms that this is Larry Ellison,'' he said.

Asked about privacy concerns, Ellison said privacy was already lost in the Internet age because so much information is available on the Internet and corporate databases.

Americans have long debated the creation of a national ID card.

The debate began in 1935 when Social Security cards were first introduced. Critics of President Franklin Roosevelt demanded that the cards be used only for tracking employees' wages.

The issue extended through the Clinton administration's failed plan for national healthcare cards in the mid-1990s with computer chips containing medical records -- a plan that conservative groups such as the Cato Institute blasted. More recently, some liberal groups have howled after Sen. Dianne Feinstein and other lawmakers advocated ID cards to block illegal immigrants from employment.

``Civil liberties groups would certainly oppose this, as would some religious groups and gun rights groups,'' said David Sobel, general counsel for the Electronic Privacy Information Center, non-profit group in Washington, D.C.

Sobel said government officials could require anyone getting on a bus, applying for a job or writing a check to show the card. The officials could save the details in a database.

``You begin to create a technology and an infrastructure that allows for the continual tracking of people's movements,'' he said.

Public supports idea

Recent polls, however, show the public supporting the idea. A Mercury News poll of San Francisco Bay Area residents taken the week of the Sept. 11 terrorist attack showed 69 percent approving a national ID card.

Dell Computer and Compaq Computer sell notebook computers equipped with thumbprint scanners used to sign on, to access different portions of a large computer network or to sign on to secure Web sites.

Though a biometric keyboard costs about $100 more than a regular keyboard, users benefit from additional security, said Sean Berg, a manager at Dell.

``There are hundreds, probably thousands, of small businesses that are using this,'' said Damon Wright, director of investor relations at Identix, a Los Gatos biometrics company.

Wright said the idea of a national ID card based on biometrics has a lot of merit. He predicted the price of a card would drop below $5.

Yet others say the technology would encounter hurdles.

``The logistics are an issue,'' said Tom Oelsner, vice president of Banque Technology Systems, a supplier of smart-card technology based in San Mateo. ``Are you going to do everybody or just resident aliens or people here on work visas? That system wouldn't have caught Timothy McVeigh. It's not as easy as it might appear.''

 

Oracle Boss Urges National ID Cards

 Offers Free Software, 

by Paul Rogers and Elise Ackerman, Mercury News, Sept. 22, 2001

``We're quite willing to provide the software for this absolutely free,'' he said.

Sure he is

Calls for national ID cards traditionally have been met with fierce resistance from civil liberties groups, who say the cards would intrude on the privacy of Americans and allow the government to track people's movements.

But Ellison said in the electronic age, little privacy is left anyway.

``Well, this privacy you're concerned about is largely an illusion,'' he said. ``All you have to give up is your illusions, not any of your privacy. Right now, you can go onto the Internet and get a credit report about your neighbor and find out where your neighbor works, how much they earn and if they had a late mortgage payment and tons of other information.''

Attempts by the Mercury News to reach Ellison for further comment Saturday were unsuccessful. Many questions about the proposal remain unanswered, such as whether foreign nationals would be required to have a card to enter the country. The hijackers in the Sept. 11 attacks are not believed to have been U.S. citizens.

In the TV interview with anchorman Hank Plante, Ellison said shoppers have to disclose more information at malls to buy a watch than they do to get on an airplane.

``Let me ask you. There are two different airlines. Airline A says before you board that airplane you prove you are who you say you are. Airline B, no problem. Anyone who wants the price of a ticket, they can go on that airline. Which airplane do you get on?''

Oracle has a longstanding relationship with the federal government. Indeed, the CIA was Ellison's first customer, and the company's name stems from a CIA-funded project launched in the mid-1970s that sought better ways of storing and retrieving digital data.

Civil libertarians said caution is needed.

``It strikes me as a form of overreaction to the events that we have experienced,'' said Robert Post, a constitutional law professor at the University of California-Berkeley. ``If we allow a terrorist attack to destroy forms of freedom that we have enjoyed, we will have given the victory to them. This kind of recommendation does just that.''

Post said while such a system may catch some criminals, it could be hacked or faked or evaded by capable terrorists. Nor is it clear that such a system would have foiled the Sept. 11 attacks, he said.

Strong support

But polls last week show many Americans support a national ID card.

 

Have you been polled? Have you ever been polled? Are you sick and tired of these invisible polls?

 

 

In a survey released Wednesday by the Pew Research Center for the People & the Press, seven of 10 Americans favored a requirement that citizens carry a national identity card at all times to show to a police officer upon request. The proposal had particularly strong support from women. There was less support for government monitoring of telephone calls, e-mails and credit card purchases.

The FBI already has an electronic fingerprint system for criminals.

Now all we have to do is get a national finger printing for free men

In July 1999, the FBI's Integrated Automated Fingerprint Identification System became operational. That system keeps an electronic database of 41 million fingerprints, with prints from all 10 fingers of people who have been convicted of crimes.

are you now considered a potential terrorist?

Faster response

The system has reduced the FBI's criminal fingerprint processing time from 45 days to less than two hours.

Paul Bresson, an FBI spokesman in Washington, said Saturday that he is unaware of the details of Ellison's proposal and declined comment.

Howard Gantman, a spokesman for Sen. Dianne Feinstein, D-Calif., said that she would be interested in discussing the idea with Ellison.

``She does feel that we do need to make some important advances in terms of increasing our security,'' Gantman said. ``A lot of people have brought up ideas about how to create more security and she's interested in exploring them. She'd like to find out more.''

One group certain to fight the proposal is the American Civil Liberties Union.

A statement about ID cards posted on the ACLU's national Web site says: ``A national ID card would essentially serve as an internal passport. It would create an easy new tool for government surveillance and could be used to target critics of the government, as has happened periodically throughout our nation's history.''

 

Miriam Webster

Main Entry: or·a·cle 
Pronunciation: 'or-&-k&l, 'är-
Function: noun
Etymology: Middle English, from Middle French, from Latin oraculum, from orare to speak 
Date: 15th century
1 a : a person (as a priestess of ancient Greece) through whom a deity is believed to speak b : a shrine in which a deity reveals hidden knowledge or the divine purpose through such a person c : an answer or decision given by an oracle
2 a : a person giving wise or authoritative decisions or opinions b : an authoritative or wise expression or answer

 

And, but of course Oracle speaks for their god Chiun and Moloch 

the star of their god

Oracle Corporation

 

Rv:13:17: 

And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.

Support grows for Ellison's national ID card proposal

BY ELISE ACKERMAN AND PAUL ROGERS
Mercury News

Silicon Valley software mogul Larry Ellison's proposal to create a national ID card has gained substantial ground -- and the interest of top Bush administration officials -- in a signal that the controversial idea may be closer to reality than ever.

In an interview with the Mercury News on Tuesday night, Ellison, the chairman and CEO of Oracle, said he met with U.S. Attorney General John Ashcroft and officials at the CIA and FBI in Washington, D.C., over the past week to discuss the idea. U.S. Sen. Dianne Feinstein, D-Calif., has endorsed it, other tech executives have jumped on board and even some prominent civil libertarians have said the idea is worth pursuing.

``We are in the process of putting a proposal together and analyzing what it would take to get to get something running in a matter of a small number of months, like three months, 90 days,'' Ellison said. ``We think we could put up this technology very, very quickly.''

 

But God said to obey the law of the land

That's correct, he did. Obey the constitution of the United States of America. This constitution was based upon God's laws. These laws are broken. The traitors to the constitution of the United States of America include George W. Bush and almost his entire cabinet. Almost all of the Congress. They have sold out your freedom to the "New World Order".

 Obey them if you will, but you will lose sight of your God, Jesus Christ. As for me and my house, we shall serve only the Lord. Which one of these do you reckon we will get to stay in?

God and his father, I trust.

 

Foreign Troops to patrol United States skies!

NATO sends planes to protect U.S ?

NATO E-3 AWACS plane

CASTEAU, Belgium (CNN) -- NATO on Tuesday dispatched the first of five AWACS surveillance planes to patrol the U.S. skies -- the first time NATO assets have been used to help protect the continental United States.

Another breach of the Constitution of the United States!

 

IT key to airport safety

IDG) -- The U.S. Secretary of Transportation's Rapid Response Team on air travel security late Friday made public a set of recommendations that build on President George W. Bush's Sept. 27 call to make commercial airports and airliners more secure against terrorism

The team's recommendations call for significant new uses of information technology, including issuing "smart" credentials for passengers and provisions for integrating intelligence agencies' data with information in airport and airline databases

 

Al Martin

The Office of Homeland Security will initially be run by former Pennsylvania
Governor Tom Ridge. It should be noted that Ridge himself got in trouble a few
years ago for praising the efficiency of the Third Reich's civilian
administration. Ridge also spoke highly of Mussolini's ability to keep the
Italian trains running on time. Now Ridge will be the guy running the Office of
Homeland Security.

Although it hasn't been made public yet, there is a proposal being prepared.
The Bush administration, however is playing it smart. They're being cautious by
whipping up public support first. Later they will announce some of the more
sinister activities of this agency.

According to an inside source, the 'Office of Homeland Security' will operate
three divisions. One will be a plain-clothes division similar to the FBI, which
will be called the State Security Division (SSD). Ironically SSD is the same
acronym as the former East German Secret Police.

The second division of the Office of Homeland Security will be a smaller
uniformed division, which currently remains nameless. It will act as a defacto
State Political Police.

 Ridge wants the uniforms of this State Political Police division to
be modeled on existing state trooper uniforms - except done in black.

The actual name of this agency, Office of Homeland Security, is very
reminiscent of 20th century era German/Fascist and Russian/Communist secret
police agencies. In America, 'Homeland' is a neuter word. In German, however,
the word is translated as 'Vaterland' (Fatherland), while in Russian, the word
is 'Rodina' (Motherland). In both cases, these words can be translated into the
English neuter word -- 'homeland.'

There is no precedent for the use of this word 'homeland' in the United States
Government.

This new agency will also operate 'with extralegal authority.' They will then
be able to act under suspension of habeus corpus and under suspension of the
right against self- incrimination, the Fifth Amendment privilege, and also the
Fourth Amendment privilege.

With this new agency, the seeds are being sown for a new classification of law
that will most likely be called 'Homeland Security Law.' Nobody knows what it
will be called yet. But this is obviously what they're doing. Anyone, who knows
the Bushes for what they are, can see that this will be the groundwork for a
new, more powerful, more sinister agency, wherein all sorts of covert activity,
illegal and not, will be extant.

In order to take the concept of 'illegal' covert activity away, they are laying
the foundation for a whole new separate body of law that will be parallel to,
but above, the National Security Acts.

The Office of Homeland Security will be a separate agency, not under any other
agency, not even under the Department of Justice. It will be the most senior
agency in the Cabinet. It will probably fall somewhere between the Department
of State and the Department of Defense, or somewhere between Treasury and
Defense. In terms of authority, it will be called a 'Super Agency,' which
implies it will not be under anyone. It will act as a coordinating agency, but
will be above the FBI, CIA, NSA, and DIA. This will, of course, create a whole
new set of turf war battles. But no agency head -- in this post-WTC
environment -- will dare say anything against it because they'd lose their job.

The new Office of Homeland Security helicopters will be painted a matte black
and have digitized red lettering that says State Security, dark tinted windows,
and numerous aerials and dishes with a big searchlight on the front. Bell
Helicopters is supposed to get the new contract to produce this new super-
surveillance helicopter. Supposedly they'll have the most sophisticated
surveillance electronics ever made. This equipment will include gear that
people don't even know has been invented yet.

 

HONG KONG POLICE

THESE ARE PART OF 20,000,000 TROOPS TO SOON COME INTO USA TO "PACIFY" USA



rom: clarence napier 


Subject: SECTION 5108. REPORT ON SUCCESS OF ROYAL HONG KONG POLICE  RECRUITMENT.

SECTION 5108. REPORT ON SUCCESS OF ROYAL HONG KONG POLICE 
RECRUITMENT.

"Not later than 6 months after the date of enactment of this Act, the 
Attorney General, in concert with the Director of the Federal Bureau 
of Investigation, the Administrator of the Drug Enforcement Agency, 
the Commissioner of the Immigration and Naturalization Service, and 
the Commissioner of the Customs Service, shall report to Congress and 
the President on the efforts made, and the success of such efforts, 
to recruit and hire former Royal Hong Kong Police officers into 
Federal law enforcement positions. The reports shall discuss any 
legal or administrative barriers preventing a program of adequate 
recruitment of former Royal Hong Kong Police officers."

The United States government insists that because of the inner city 
violence, there is a need for a national police force and the hiring 
of foreign troops, along with the confiscation of firearms. The 
British Government has used Chinese Ghurkas as the Royal Hong Kong 
police for many decades, plus they used them as a mercenary army 
throughout the world. The Ghurkas have been training in the United 
States for a few years.

Journalists and public officials in Montana have verified their 
presence.  President George Bush signed an executive order allowing 
U.N. troops to be used in the United States to quell civil unrest. 
President Bill Clinton has signed an executive order that allows 
United States troops to serve under foreign commanders.

At Fort Polk, Louisiana, U.S. and foreign troops train together - 
including Russian soldiers. Part of the training is in a mock city 
built by the government. The training focuses on door-to-door 
searches for weapons.

Similar training was conducted by the Federal Emergency Management 
Agency (FEMA) in Montana. The Associated Press reported on August 21, 
1993, the use of Russian equipment and personnel at Fort Polk. The 
information service office at the base did verify the Russian 
presence. In both Alabama and in Mississippi Russian and German 
trucks are parked in compounds which are guarded by black-uniformed 
soldiers wearing ski masks.

In Anchorage, Alaska, as reported in the Anchorage Times, black 
uniformed soldiers arrested a motorist and detained him. The incident 
took place on the Glen Highway near Wasilla. A motorist was speeding 
and was pulled over by four civilian type vehicles with flashing 
lights. The motorist stopped his vehicle and was approached by a 
black uniform trooper with a new model M-16 and packing a sidearm - 
with no badge or identifying emblem. When the trooper and others 
started to search the motorist's vehicle, the motorist said he wanted 
to see a search warrant only to be informed that these troopers did 
not require a search warrant. Everything was removed from the 
vehicle. A similar incident occurred in Northern California on 
Highway 880.

When the motorist asked for identification from the troopers and a 
search warrant, his vehicle was seized.

                           GANGS RECRUITED

But what is of more concern is the fact that the United States 
government is now recruiting street gangs. On February 9, 1994, a 
seminar was held in Chicago. The seminar was called an Urban Summit 
in which people like Chicago gangster Wallace "Gator" Bradley was one 
of the attendees. Bradley is the "enforcer" for "King" Larry Hoover, 
the leader of the Gangster Disciples. The government provided grants 
to the gangs. The grants, up to $2.5 million, have been provided as 
an incentive to preserve peace between the gangs. The Washington 
Times reported on December 14, 1993, "As part of Operation 
Reconstruction, a fledgling campaign to curb street violence, 
business leaders are outfitting some of the city's toughest gang 
members with free cellular phones, jobs and cash. In exchange, the 
gang members are expected to patrol their neighborhoods." The 
program's board of directors include Crips leader Michael Darren 
Ashbrry, who recently threatened to shoot the local police and kill 
their families, and Bloods leader Eric David James, whose criminal 
record includes burglary and aggravated motor vehicle theft. Of such 
a program, the Los Angeles Times reported on April 19, 1993, "A year 
ago, Bloods and Crips emerged from the ashes with their red and blue 
bandannas tied in unity. The summer months were marked by jubilant 
peace gatherings at the housing projects in Watts..." A few of the 
gang leaders were financially rewarded by the government. But when no 
further funds were provided the gangs threatened new armed violence 
and terrorism.

In 1966, a Chicago gang truce was negotiated between the Blackstone 
Rangers and the Eastside Disciples. The "peacemakers" were rewarded 
with a $972,000 Federal grant. After receiving the Federal money, the 
Rangers evolved into an even more ruthless syndicate called El Rukn. 
During the French Revolution, the Sans-Culotte mobs were organized 
and controlled by conspiring elites; the mob violence prompted the 
manipulable masses into seeking authoritarian controls from the 
revolutionary government. The Nazis used the Brown-shirts to create 
violence.

In the Crime Bill of 1991, passed by Congress by an overwhelming 
margin, there are provisions for the U.S. Government to build scores 
of detention camps around the nation. These detention camps are 
reportedly to be used for illegal aliens, drug traffickers, and 
political dissidents. In the 1930s, the Nazis also built such 
facilities for "similar purposes". Though Congress authorized their 
construction in 1992, many of these facilities had already been 
built. The 1991 Crime Bill allows the President of the United States 
to declare martial law in case of a "drug crisis".

There were 24,703 Americans murdered in 1991 and 1.9 million 
incidents of violent crime reported - and the emphasis is on 
reported. The San Francisco Chronicle article of October 7, 1993, 
further states, "The very thought of these UN troops on American 
street corners is undoubtedly offensive to millions of Americans - 
the thought of soldiers from around the world, under the banner of 
the United Nations, taking over our streets. After all, UN. soldiers 
traditionally are deployed only to nations that cannot take care of 
their own problems." The article implies, the United Nations would 
send troops to any nation with such a lawlessness state - and the 
United States would qualify under those guidelines.

                          EMERGENCY POWERS

The nation has been gearing up for internal problems for many years. 
Hundreds of Presidential Executive Orders have been issued to allow 
emergency powers under any type of crisis - perceived or real. A 
Presidential Executive Order - whether Constitutional or not - 
becomes law simply by its publication in the Federal Registry. 
Congress is bypassed.

Here are just a few Executive Orders that would suspend the 
Constitution and the Bill of Rights. These Executive Orders have been 
on record for nearly 30 years and could be enacted by the stroke of a 
Presidential pen:

   * EXECUTIVE ORDER 10990 allows the government to take over all 
     modes of transportation and control of highways and seaports.
   * EXECUTIVE ORDER 10995 allows the government to seize and control 
     the communication media.
   * EXECUTIVE ORDER 10997 allows the government to take over all
     electrical power, gas, petroleum, fuels and minerals.
   * EXECUTIVE ORDER 10998 allows the government to take over all 
     food resources and farms.
   * EXECUTIVE ORDER 11000 allows the government to mobilize 
civilians 
     into work brigades under government supervision.
   * EXECUTIVE ORDER 11001 allows the government to take over all 
     health, education and welfare functions.
   * EXECUTIVE ORDER 11002 designates the Postmaster General to 
     operate a national registration of all persons.
   * EXECUTIVE ORDER 11003 allows the government to take over all 
     airports and aircraft, including commercial aircraft.
   * EXECUTIVE ORDER 11004 allows the Housing and Finance Authority 
     to relocate communities, build new housing with public funds, 
     designate areas to be abandoned, and establish new locations for 
     populations.
   * EXECUTIVE ORDER 11005 allows the government to take over 
     railroads, inland waterways and public storage facilities.
   * EXECUTIVE ORDER 11051 specifies the responsibility of the Office 
     of Emergency Planning and gives authorization to put all 
     Executive Orders into effect in times of increased international 
     tensions and economic or financial crisis.
   * EXECUTIVE ORDER 11310 grants authority to the Department of 
     Justice to enforce the plans set out in Executive Orders, to 
     institute industrial support, to establish judicial and 
     legislative liaison, to control all aliens, to operate penal and 
     correctional institutions, and to advise and assist the 
     President.

Without Congressional approval, the President now has the power to 
transfer whole populations to any part of the country, the power to 
suspend the Press and to force a national registration of all 
persons. The President, in essence, has dictatorial powers never 
provided to him under the Constitution. The President has the power 
to suspend the Constitution and the Bill of Rights in a real or 
perceived emergency. Unlike Lincoln and Roosevelt, these powers are 
not derived from a wartime need, but from any crisis domestic or 
foreign, hostile or economic. Roosevelt created extraordinary 
measures during the Great Depression, but any President faced with a 
similar - or lesser - economic crisis now has extraordinary powers to 
assume dictatorial status.

                   UNITED NATION'S GROWING STATUS

The Constitution of the United States provides a mechanism by which 
foreign treaties must be approved by both the President of the United 
States and the U.S. Senate. This also holds true for covenants and 
agreements that require United States participation in foreign 
bodies.

In 1918, President Woodrow Wilson was the architect of the League of 
Nations, an international body that would regulate the conduct of 
nations. The need for such a League was vital in the eyes of Wilson. 
But to implement it and have the United States participate in it, the 
Democratic President needed the confirmation of the Republican 
Senate. The Senate declined to oblige the President and the United 
States never became a member of the League of Nations. Without the 
United States, the League sat hopelessly by watching the clouds of 
World War Two form over Europe, Africa and Asia. With the outbreak of 
the war, the League of Nations collapsed.

President Franklin Roosevelt, Prime Minister Winston Churchill, and 
Premiere Josef Stalin formulated a plan to institute the United 
Nations. President Harry Truman stated immediately after Roosevelt's 
death that the United Nations concept would go forward. The United 
Nations was born in San Francisco in 1945. The world headquarters for 
the United Nation was scheduled to be built in Moraga, California, 
until the Rockefeller family offered the New York site free.

The United Nadons was a weak organization, with veto power vested in 
the Security Council composed of the world powers of the time - the 
Soviet Union, Nationalist China, Great Britain, France and the United 
States. Any one nation had the power to cancel any action. There is a 
gathering strength in the United Nations today, that never existed 
before and that new position does worry some American political 
observers. More increasingly, smaller countries are beginning to 
dominate votes in the General Assembly. The breakup of the Soviet 
Union, for instance, could provide a greater voice with each Republic 
gaining a seat in the United Nations. Already, the nation of 
Macedonia - part of Yugoslavia, has been admitted. There are more 
socialist countries in the United Nations now than there are 
democracies - shifting the balance of power in the General Assembly.

When the United States sought support for its invasion of Iraq, it 
turned to the United Nations and several powers, including the Soviet 
Union, to unify public opinion. At that time President George Bush 
referred to such operations as the New World Order. But the Iraqi War 
was not the driving force for the New World Order, it was the first 
public showing of such an Order. Going along with the concept of the 
New World Order, United Nations troops are becoming more active - in 
Yugoslavia, Somalia, Haiti and in Cambodia. President Bush even 
signed an Executive Order in April 1992 permitting United Nations 
troops to operate within the boundaries of the United States to quell 
domestic or international violence that might occur here.

Where did President Bush gain the authority for such an Executive 
Order? The authority can be found in the First Session of the 97th 
Congress in Senate Treaty Document No. 97- 19. On January, 17, 1980, 
while President Jimmy Carter was still in the White House, the 
President and Senate confirmed the Constitution of the United Nations 
Industrial Development Organization.

                   ARTICLE 2 OF UNITED NATIONS LAW

The Preamble, Article I (Objectives) and Article 2 (Functions), 
defines the entire concept of the New World Order - eight years 
before the election of President Bush and 10 months before the 
election of Ronald Reagan. The foreign Constitution states that the 
intent of the New World Order is to "direct, control, finance and 
subsidize all natural and human resources and agro-related, as well 
as basic industries...through dynamic social and economic 
changes...with a view to assisting in the establishment of a new 
international economic order." The Preamble creates an oligarchy who 
will establish "rational and equitable international economic 
relations". United States currency and coin, used by most standards, 
would no longer be stabilized nor assured of its value. A new 
economic standard would be implemented. An example of this type of 
shifting can be seen in Europe with the establishment of the Euro 
Dollar, which forced several European nations to devalue their 
currency. The United Nations Industrial Development Organization does 
not call for general elections. A total of 45 members are elected to 
a Board of Directors by the General Assembly. There is no guarantee 
the larger, more industrial nations will be represented on the Board.

Since the President and the Senate approved the U N. Constitution, 
many laws have been created in this nation under the guise of 
Executive Orders or, for example, the Crime Bill of 1991, allowing 
more power to the President in time of domestic or international 
emergency. Senate Report 93-549 states: "Under the powers delegated 
by these statutes, the President may; seize property; organize and 
control the means of production; seize commodities; assign military 
forces abroad; institute martial law; seize and control all 
transportation and communication; regulate the operation of private 
enterprise; restrict travel; and in a plethora or particular ways, 
control the lives of all American citizens."

There has been much debate focused on whether the American people 
would allow such drastic measures to be taken. Most experts agree 
that it would take an extraordinary crisis in order for any President 
to invoke such non-Democratic measures. The criterion of an emergency 
has not been defined in any law, but it provides for domestic, 
international or even just monetary threat to allow the activation of 
such harsh controls. If the American people, in general, believed 
that such a crisis was that acute, the ability to invoke such 
measures would be made easier. Obviously, there would be some pockets 
of resistance. Though there have been such laws on the books since 
President Richard Nixon helped to shape them, no President has 
invoked them nor even threatened publicly to do so. But any given 
President at any given time has the power and the resources to invoke 
such laws. Under regulations approved by Congress, such laws could be 
invoked without their consultation or approval, and Congress would 
not be allowed to review such actions until six months after they had 
been activated. In the Crime Bill of 1991, Congress provided similar 
powers that allow for the construction of detention camps, the 
rounding up of aliens and U.S. citizens, the suspending of habeas 
corpus - Constitutional law protecting against illegal detention - 
and the right to declare martial law in the event of a "drug crisis".

Senate Report 93-549 concedes, "A majority of the people of the 
United States have lived all of their lives under emergency rule. For 
40 years freedoms and government procedures guaranteed by the 
Constitution have in varying degrees been abridged by laws brought 
into force by states of national emergency. Nixon declared a state of 
emergency in 1973 and there are no documents to support that the 
emergency was lifted. Much of the foreground of the "emergency" has 
been the atomic age. The fear of massive nuclear attack set a series 
of emergency agencies and laws into effect. The main purpose was to 
assure the continuity of government in the case of a nuclear attack 
survival, pure and simple, of the American government. But in placing 
such regulations into the survival scenario, what the United States 
government did was to protect government officials and offices, but 
not the survival or assurances of the democratic processes. The 
intent was to be able to survive a nuclear attack and retaliate. 
Saving democratic principles was of less concern than preventing an 
aggressor, who launched the nuclear attack, to win an undeclared war 
in a matter of minutes. A nuclear counterattack would have been met 
with a second nuclear strike, met in turn by a second counterattack.

Today, that emergency level has shifted away from the nuclear attack 
scenario and focused instead on economic problems and the potential 
of civilian unrest within the United States. The Executive Orders, 
transfer of power to the Federal Emergency Management Agency (FEMA), 
the Crime Bill of 1991, and United States ratification of the United 
Nations Constitution in 1980, all commence to usurp the rights of 
Americans guaranteed under the Constitution of the United States. The 
seizure laws, gun control measures, emergency legislation, all eke 
away at Constitutional rights guaranteed to all citizens.

President John F. Kennedy attempted to shift the economic power base 
away from the independent Federal Reserve Board and back to Congress. 
Under the Constitution, only Congress shall have the right to coin 
money. Yet if you look at every bill in your wallet, you will see 
that it is a Federal Reserve Note. Kennedy signed an Executive Order 
in 1963, directing the monetary system of this nation be placed back 
into the Constitutional hands of Congress. He was assassinated within 
three weeks of that order and President Lyndon Johnson rescinded the 
order within a week of taking office. President Dwight D. Eisenhower 
warned the nation, on his retirement from the Presidency, not to 
trust the powers that were building - the military-industrial 
complex. The changes in our fundamental freedoms have, as the Senate 
stated, been eroded in some form for 40 years.

The public documentation exists on these erosions, but few 
individuals have sought them out and few people of influence have 
bothered to inform the public of these basic changes. The 
corporate-owned media has sat quietly by on the sidelines, reviewing 
profits and not public priority. America has been gradually shifting, 
laws have been created over four decades that have established the 
machinery for massive Presidential authority in any time of undefined 
emergency.

The only question that remains is: Will the day and the person come 
that will see the implementation of these laws? George Washington's 
vision foresees foreign troops on American soil and the eventual 
triumph of the people of this land. Lincoln says destruction can only 
come from within.


NEW YORK (CNN) -- As the U.S. investigation into the September 11 attacks continues, many civil libertarians said they are concerned about the possible violation of fundamental U.S. civil rights for those who have been arrested and detained.

Lawyers also said that the government will not say which people are being held or what the charges might be. In some cases, attorneys and legal analysts said, the usual rules governing detentions have been altered or even suspended.

Nazi Germany

Although the secret police in Italy during Mussolini's rule were notorious, probably the most extreme and terrible example was that in Germany under Adolf Hitler. Under National Socialism, Germany became a police state, a state where the power of the police, and especially the secret police, over security and justice was tyrannically applied with virtually no procedural checks.

The German secret police had its genesis in the SS, or Schutzstaffel [defense echelon], created as Hitler's bodyguard under the SA (the military arm of the Nazi party), and in the SD, or Sicherheitsdienst [security service], organized in 1931 as the intelligence branch of the SS. From 1929, Heinrich Himmler controlled the SS. The Gestapo (secret state police) originated in 1933 under Hermann Goering and was ultimately merged with the SD. Just as the Gestapo had its secret operatives among the mass of the population, the SD had agents, known only to the chief SD officers, in every department of the German government, in the armed forces, in the Nazi party, among chief industrial executives, and among the Gestapo itself. While the Gestapo was known and feared, the existence of the SD was known to few.

The powers of the Gestapo, the SS, and the SD were vast; virtually any person suspected of disloyalty to the regime or of social aberration could be summarily arrested, executed, or interred in a concentration camp. The SS, literally a separate army, was responsible to Himmler alone; thus, probably for the first time in history, a secret police wielded virtually absolute power. The crimes and atrocities of the Nazi authorities in Germany itself and throughout German-occupied Europe during World War II were largely carried out by the SS and the Gestapo, who controlled the concentration and extermination camps, and who set up their subsidiary agencies in every conquered country

 

Focusing on biometrics at Comdex

Body of data: Eyeballing security

November 15, 2001 Posted: 2:10 PM EST (1910 GMT)

November 15, 2001 Posted: 2:10 PM EST (1910 GMT)

By Daniel Sieberg
CNN Sci-Tech

LAS VEGAS, Nevada (CNN) -- One area of technology getting a lot of attention at Comdex Fall 2001 is biometrics.

This is the screening and measurement of any personal physical human feature that might be used for identification. Airport security needs are an obvious priority, of course. And dozens of companies specializing in biometrics are on the massive Comdex showroom floor this year to show off what they're researching, developing, testing, calibrating and selling.

Facial recognition, fingerprinting, iris scanning and reading the features of a hand are leading the industry's efforts at this point, but the intent -- and possibility -- is to measure any unique trait on the body that can then be recorded and act as a password or identifier

Will these techniques invade personal privacy? Can they help make airports and other places safer?

Analysts say it largely depends on whether people are more willing to trade some civil liberties for security since the terrorist attacks of September 11.

________________________________________________________________________________________

The Judas attitude of the Administration is symbolized in an article written by Bill Clinton's very close friend, Deputy Secretary of State Strobe Talbott, titled: "The Birth of the Global Nation." Talbott strongly attacked American national sovereignty, stating: "NATIONAL AS WE KNOW IT WILL BE OBSOLETE: ALL STATES WILL RECOGNIZE A SINGLE, GLOBAL" (666) "AUTHORITY," (7\20/92 Time Magazine).

________________________________________________________________________________________

A number of citizens have already been illegally detained. The 10\14\94 WASHINGTON TIMES reported that U.S. Marines in California had to fill out a "Combat Arms Survey" that asked 39 questions about attitude to determine if AMERICAN MARINES WERE WILLING TO SERVE THE NEW WORLD ORDER TRAITORS AND FIGHT AGAINST THEIR OWN FELLOW CITIZENS. Marines were asked to give their attitudes on the treason statement: "I am a United Nations fighting person. I serve in the forces which maintain world peace and EVERY Nation's way of life. I am prepared to give my life in their service." The last item on the survey asked the Marines' attitude about the statement: "I WOULD FIRE UPON U.S. CITIZENS, WHO REFUSED OR RESIST CONFISCATION OF FIREARMS BANNED BY THE U.S. GOVERNMENT."

________________________________________________________________________________________

Now why do you suppose God will Bless America? Oh, but don't worry you will be mystically "Raptured" in that secret coming of Jesus won't you?

9-11 may drive license changes
By THE ASSOCIATED PRESS

Driver's licenses could contain personal information on motorists, such as fingerprints or retinal scans, under a proposal submitted yesterday by the state's Motor Vehicle Administrator.

Licenses are "the de facto national I.D. card," Motor Vehicle Administrator Anne Ferro said. "This would reduce fraud and ensure the integrity of licenses after they are issued."

News that some of the terrorists involved in the Sept. 11 attacks had fraudulently obtained driver's licenses focused attention on the need to tighten the licensing system.

The Anti-terrorism Workgroup -- established by Gov. Parris N. Glendening and legislative leaders -- included driver's licenses among the issues it is considering as it prepares

 legislation for the 2002 General Assembly session.

Ms. Ferro said biometric technology exists to include a bar code on licenses that could identify drivers by fingerprint, scans of the iris or retina, facial characteristics and signatures.

UCC Rossettanet's symbology

Will this be your UPC Bar Code 666 number universal with your very own assigned international ID number?

Does this bother you? See the very same markings now coming up in US Treasury Bills below



"Maryland doesn't have any authority that would allow us to use biometrics. We should have it," she told members of the group during a meeting in Annapolis.

State law now requires that licenses issued to people who are not U.S. citizens cover the same five-year period as regular licenses. The Motor Vehicle Administration proposed that licenses of non-citizens expire when their visa or passports expire, if that is less than five years.

New Jersey already has such a limit, and California and Florida are now issuing 30-day licenses while their agencies confirm with the Immigration and Naturalization Service that a person is in the country legally, Ms. Ferro said.

________________________________

Are we all so stupidly blind with this Hollywood drummed up Dime-Store Patriotism that we cannot seem to understand that the U.K and much of the rest of the world are using New York's so-called acts of bin Laden, terrorism to establish the Mark system of the coming cosmic-christ, Moshiach who will become the King of the Jews?

 

LONDON, England (IDG) -- Imagis Technologies Inc. and Serco Group PLC are working with the UK's National Crime Squad (NCS) to develop a facial-recognition application for use in crime fighting.

The squad is working on a national database based on Imagis ID-2000 facial-recognition technology to use as a tool for keeping track of convicted pedophiles and other criminals, Imagis announced at the Biometrics 2001 Conference here on Thursday.

"We are working with both Imagis and Serco on the technology," an NCS spokesman confirmed.

 

UK-based Serco is a management and consulting company that has been providing IT support to the U.K. government and the NCS, a government agency, for a number of years. The Canadian Imagis Technologies is a developer of image-identification software with a focus on biometric facial recognition, according to the company's Web site.

Of course their logo is the Illuminated cosmic Light with the three slashes of the Luciferic Trinity symbol

Financial terms of the deal were not disclosed.

The Imagis' ID-2000 was picked for further development by the UK government for its ability to identify an individual within very large databases of images in seconds, its ability to search for common background scenes as well as faces, its use imagery from any source, including live video as well as digital and analog photos and the security built into the program that allows for the secure transmission of data even from remote databases, Imagis said in a statement that was vetted and approved by the NCS.

The software will aid law-enforcement agencies in identifying victims and perpetrators as well as background imagery for criminal investigation and case preparation, Imagis said.

Already being used by the NCS, the facial-recognition technology is playing a part in the ongoing investigation into an online pedophile group which on Wednesday led to the arrest of 130 people worldwide, 10 in the UK, Imagis said.

The software is also being looked into as a tool for the fight against international terrorism, an NCS spokesman said.

If you believe that, I've got some ocean front property in Afghanistan

In October, a U.S. Senate subcommittee began looking into the possible future use of cutting-edge devices such as facial-recognition monitors and retinal scanners as a way to combat terrorism following the attacks in New York and Washington D.C. on September 11.

The Imagis ID-2000 facial-recognition technology is also currently being used by the Oakland Police Department (OPD), in Oakland, California throughout Alameda County, including the Oakland International Airport, the OPD and Imagis announced in October.

____________________

 

 

 

Goodmorning computer. 

Gooooooood morning Mr. X. 

Computer I need you to get throught to NSA immediately, lock into security system 2X-2L

Mr. X, you must first do a retina scanning, you know that, silly.

Oh, sorry computer!

Is this science fiction or will this be the system in which you will not be able to buy or sale? Will you purchase food? Will you pay tax on your property? Will you feed your children? Will you have electricity and water services? Will you accept it? Have you already been deceived by everything mentioned in this entire web-site?

Will you stand firm and give testimony and witness for the real Jesus? 

Will the real Satan please stand-up?

But of course this company which sports the Mark, knows that this Illuminated coming Moshiach's system is ready and waiting for him

This company, of course sports the coming falsechrist logo, but am I surprised any more?

Like the Apostle Paul, I know I prosper in the name of my Lord Jesus Christ the son of God in Heaven the Most High God. All the world will hate me because of my Lord's name.

Keyware - Internet Solutions Group Europe, Excelsiorlaan 32-34, B-1930 Zaventem, Belgium

Until recently, computer security systems relied on what the user knew (password or PIN) to identify him/herself or what they had (a token or smart card). Lately, biometrics has added another dimension to the authentication puzzle by offering the choice of who the user is (fingerprints, voice, face, etc.). According to industry analyst firm, Frost & Sullivan, the market for authentication technologies, including biometrics, will reach $2.6 billion by 2006. In a response to this ever-growing variety of authentication methods, Keyware has created the Centralized Authentication Server (CAS), which allows organizations to manage all their authentication methods (PKI, biometrics, smart cards, PINs, passwords, etc.) from one server. CAS also allows organizations to manage security in a variety of areas from the network to the call center to building entry. With CAS, any authentication method can be deployed at any point of security.

Keyware specializes in biometrics—the technology of measuring an individual’s unique personal characteristics such as voice, face, and fingerprints. With its advancements of this core technology, Keyware now delivers biometric authentication with the highest levels of security, efficiency, and convenience for today’s environments.

 _____________

Have you got caught up in the Casino schemes?

Enhance the integrity of your existing surveillance equipment with our state-of-the-art biometric facial recognition technology. Casino-ID will capture, store and match surveillance photography quickly and easily. Catalog intelligence data to identify suspects and potential risks protecting your staff, clients and property.

Casino-ID is an advanced software application for tracking incident-based information and photography including suspect's MO, behaviors, characteristics and activities such as card counting, slugs, capping and more.

_________________________

When the Iluuminated Angels system is in place, have you found an area to hide? Uh Oh, not so fast!

 Don't get caught Trespassing.

Trespass-ID is a biometric software application designed specifically for security professionals who need a better way to identify and track undesirables, their associates and specific behaviors, before they commit crimes and do damage. Digital images are taken from the security room and compared to a local and centralized repository of known offender images for positive identification and apprehension.

"

___________________________

Radian has great uses for its Biometrics surveilances for the future. One of its best products will be, Oh no don't tell me

ISiS - logo - Bckrnd.jpg (11438 bytes)

Yes Isis - Semiramis-Like in Queen of Heaven Isis, the wife of Osiris Ra

___________________

And another who will have your number and "His" 666

And "He" will have his eye on you

 

And the Germans are ready for the cosmic-eye too?

________________________

FBI confirms 'Magic Lantern' spy project

December 13, 2001 Posted: 10:11 AM EST (1511 GMT)

December 13, 2001 Posted: 10:11 AM EST (1511 GMT)

SAN FRANCISCO, California (Reuters) -- An FBI spokesman confirmed Wednesday that the United States government is working on a controversial Internet spying technology, code-named "Magic Lantern," which could be used to eavesdrop on computer communications by suspected criminals. 

(Christians- any who oppose-any who know the truth?)

"It is a workbench project" that has not yet been deployed, said FBI spokesman Paul Bresson. "We can't discuss it because it's under development."

The FBI has already acknowledged that it uses software that records keystrokes typed into a computer to obtain passwords that can be used to read encrypted e-mail and other documents as part of criminal (Christian) investigations.

Magic Lantern reportedly would allow the agency to plant the a Trojan horse keystroke logger on a target's PC by sending a computer virus over the Internet, rather than require physical access to the computer as is now the case.

Should be indicted for criminal hacking

Malicious hackers have been known to use e-mail or other remote methods for installing spying technology, security experts said.

Oh, But the Government is not malicious?

When word of Magic Lantern leaked out in published reports in November, civil libertarians said the program could easily be abused by overzealous law enforcement agencies.

Already has been abused

When asked if Magic Lantern would require a court order for the FBI to use it, as existing keystroke logger technology does, Bresson said: "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process."

You are guilty until proven innocent

Major antivirus vendors this week said they would not voluntarily cooperate with the FBI and said their products would continue to be updated to detect and prevent viruses, regardless of their origin, unless there was a legal order otherwise.

Bravo!

Doing so would anger customers and alienate non-U.S. customers and governments, they said, adding that there had been no requests by the FBI to ignore any viruses.

Step beyond 'Carnivore'?

The FBI set a precedent in a similar case by asking Internet service providers to install technology in their networks that allows officials to secretly read e-mails of criminal investigation targets.

While the FBI requires a court order to install its technology, formerly called "Carnivore," some service providers reportedly comply voluntarily, while court orders are relatively easy to get, civil libertarians argue.

Remember Basement Court, secret Judges set up just to give court orders?

Given the hijacking attacks of September 11, it is also conceivable that the U.S. government would enlist the aid of private companies to combat terrorism and help its war effort, said Michael Erbschloe, vice president of research at Computer Economics, which analyzes the impact of viruses.

"In previous wars, including World War II, the government had the power to call on companies to help; to commandeer the technology," said Erbschloe, author of "Information Warfare: How to Survive Cyber Attacks."

The people are to dumb to see themselves being herded into a despotic rule?

"If we were at war, the government would be able to require technology companies to cooperate, I believe, in a number of ways, including getting backdoor access to information and computer systems."

We are not at war, you said it yourself!

___________________________________

and what about? This seems to be an ocultic date, hopefully someday soon I will pen it down or 

Button it up

 


Time Magazine

The National ID Card That Isn't, Yet
The Department of Transportation takes the back door and starts linking state driver's licenses. Are 50 national ID cards any better than one? 


JIM McKNIGHT/AP

A driver's license bar code reading device that reveals the age of the owner

 

Tuesday, Jan. 08, 2002
It wouldn't be a national ID card — not really. The Department of Transportation, acting on instructions from Congress, has begun work with states to develop electronically smarter drivers' licenses that can be checked for validity across the country, and that have more than just than that always-awful picture — like a fingerprint or retinal-scan imprint — to match the card to its holder.

So it's more of a national ID system, a linking of Departments of Motor Vehicles — and the records they keep on you — across state lines, with some extra on-card security measures thrown in. For terrorists on the run (and other criminals, too, but nobody worries about them any more) the plan means that a state trooper in California would be able to pull the records of a driver from Georgia — and be certain that those records were the driver's, and not an innocent lookalike he stole the card from.

For the rest of us, this wouldn't be so different than what's already in place. The standardized databases would save the California state trooper a phone call to Atlanta; he'd be able to run a nationwide check from his car. And the smarter cards, "hardened" with biometric data, would make identity theft much trickier, at least in person. (Georgia, incidentally, already uses thumbprints on its drivers' licenses.)

The plan, Congress hopes, will be cheaper and easier to implement, and less likely to incur the talk-show ire of civil libertarians and states' rights purists (the same type who squawked in 1908 when the FBI was born). But the approach is mere stealth — 50 different state ID cards all linked together is pretty much the same as one national ID card, just as all those new quarters are still worth 25 cents each, no matter which state is on the back.

Big Brotherly love?

For some, the real problem with smarter, more centralized ID cards is that they give bureaucrats a better chance to screw up more of your life when you accidentally get put into the Big Computer as, say, a serial flasher. For others, it's that the federal government can punch a few keys and trace your steps. But they can do that already. (Remember when Ken Starr subpoenaed the list of books Monica Lewinsky bought at a D.C. bookstore with an ordinary credit card?) With a nationalized driver's license/ID card — whether it says "New York State" or "United States" — it'll just be easier.

The great leap forward from a longer arm for the law to "1984" will have to be made by the private sector. How well a watchful federal government will actually be able to track its citizens will depend on how many places demand to see your driver's license. Airports already do. So do some supermarkets, if you're buying beer. But what about malls? Movie theaters? Sports stadiums? Banks and their ATMs? If all the places you go demand a swipe to weed out terrorists — and are willing to pay for the technology to do the swiping — then yes, Big Brother could know where you go and what you do while you're there.

Of course, that could make life easier for you too. What if your state/national ID card was your passport as well as your drivers' license? What if you could do your taxes at an ATM — and then withdraw your refund? Or what if your national ID card was your ATM card, and your credit card, and your HMO card and your work ID and the passkey to your maximum-security apartment, all at once? There's the freedom to continue to come and go as you please, in (relative) anonymity, and there's the freedom to carry a dozen different cards and identifications around with you wherever you go.

The real concern

The national ID-card issue to really fight about may be when and whether citizens will be required to carry them. The average American driver's license gets a pretty good workout these days — certainly far more than traffic laws themselves would seem to warrant — but you can only get arrested for driving without one. If the U.S. domestic response to terrorism starts to resemble Zimbabwe's, which passed a law in November making it compulsory to carry ID on pain of fine or imprisonment, well, that's something to worry about.

But until Congress passes a law like that — and until you can't enter a movie theater without the usher checking you for priors — there isn't all that much to get exercised about. Most of the privacy rights — if there really are such things — vulnerable to a nationalized ID card have already been trampled under the wheels of increased security, more efficient law enforcement and better business long ago. Most of them can be regained simply by paying cash — and keeping your fingerprints off the murder weapon.

Time, Just another "One World Order" Propagandist, giving the go ahead to "Please Show Your Papers Sir"

SCAN THIS NEWS
10/11/98

[Forwarded message]

    FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED OCT. 4, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Boiling the frog: Much will depend on the new 'electronic money'

EDITORS: A version of this feature first appeared in the October edition of
Las Vegas Magazine.

    An Internet press release (how trendy) from the folks at MasterCard
International, datelined "Purchase, N.Y., July 22, 1998," informs us:

  "MasterCard International hosted today an online forum with thought
leaders from global business, government and research organizations to
discuss lifestyle changes that will occur as smart card technology gains
acceptance over the next five years.

  "Representatives from IBM, Hitachi, British Telecommunications plc, the
U.S. federal government's General Services Administration, The Tower Group
and Emerge Online participated in the roundtable, which was moderated by
Richard Phillimore, Senior Vice President of MasterCard's Chip Card
Business unit.

  "'Five years from now, multi-application smart cards will be an
established technology in the payments business,' Phillimore said. 'As the
benefits of multi-application smart cards are proven in the marketplace,
the conversion from magnetic stripe to chip-based payment cards will be
very rapid. By the year 2010, we expect all of MasterCard's credit and
debit cards and terminals will be chip-based.'

  "Smart cards will deliver increased consumer value and utility to today's
credit cards, Phillimore added. 'Chip technology will enable cardholders to
use their cards for many more purposes, such as electronic ticketing,
loyalty programs, and secure remote shopping -- a true Lifestyle Card that
can be tailored to meet the unique needs and  preferences of a single
individual.'"

  When mentioning those ominous-sounding "loyalty programs," I should point
out, the online MasterCard gang are referring not to government loyalty
oaths of the "am not now and never have been a member of the Communist
Party" variety, but rather a system in which cardholders receive discounts
for "loyally" shopping through one company -- the system probably familiar
to most consumers today via those "discount club cards" issued by your
supermarket, offering you 30 cents off a package of toilet paper if you let
the teller scan your card at the checkout stand.

  Of course, the store gets something back in return for that discount. In
addition to the obvious hope that you'll keep going back to the store whose
discount card you carry (essentially, a surcharge is being applied to
"hoppers" who show no store loyalty), the management can now easily track
how many of its outlets you visit, and what you buy there.

  The initial commercial applications may be innocent enough -- "Let's save
postage by only sending coupons for this new brand of breakfast cereal to
the home addresses of our shoppers who already buy the more expensive
competitor." But you don't have to be the kind who walks stooped over to
avoid the black helicopters to foresee the day when the government
inspectors may arrive, asking to see the electronic profiles of all
customers in a given geographic area who have used the fast-spreading cards
to buy anything from home AIDS test kits to hydroponic "grow lights" to
"High Times" magazine to pistol ammunition.

 It's all stored in the computer, you know. And how long do you think Jack,
your friendly local produce manager, is really going to refuse to let the
FBI access his computer without a court order? About as long as it takes
them to ask for his Social Security number and threaten to call their
friends at the IRS, suggesting Jack may be in need of an immediate tax
audit?

  The cheerful little MasterCard press release doesn't take long to broach
the subject of "expanded uses" for the new cards with their embedded memory
chips:

  "The panel also addressed the use of smart cards for identification
purposes. Many agreed that identification was the 'killer application' that
would encourage adoption of smart card programs. Kotaro Yamashita, COO of
Financial Services at Hitachi, Ltd. said, 'We see identification
applications issued by governments as being big in many places outside of
Asia, for example Central America.' However, Marty Wagner, Associate
Administrator of the Office of Government wide Policy at the U.S. General
Services Administration (GSA) cautioned that 'National identity card
programs could run into trouble in the U.S. due to privacy concerns.' "
 

    #   #   #

 The process of accustoming Americans to carrying around cards which can be
used to buy anything from a candy car to a soda pop to a round-trip airline
ticket to London -- but whose embedded chips will also relay to corporate
and government snoops the social security number and other personal
information (and resultant tax obligations) of anyone making that purchase
-- is well underway.

  There's an old folk warning that if you throw a frog in boiling water he
will quickly jump out. But if you put a frog in a pan of cold water and
raise the temperature ever so slowly, the gradual warming will make the
frog doze happily, triggering the soporific response he instinctively
displays when the sun shines on his lily pad ... In fact, the frog will
eventually cook to death, without ever waking up.

 Likewise, some mighty high-powered public relations types are figuring
ways to emphasize the convenience of "electronic cash" - and downplay the
effect it may have in removing any remaining privacy from the way you spend
your pay.

  The goal? To cook the frog, without any ruckus.

  Convenience, convenience, convenience, was the happy spin Time magazine
put on a new "single electronic card that may replace everything in your
wallet," in their issue of April 27, 1998. As the magazine was listing all
the bothersome stuff you now have to lug around - cash, ATM cards, credit
cards, proof of insurance - it made a not-so-subtle swipe at anyone who
would resist the happy consolidation of such burdens:

 "Your ID cards. PRESENT: You lug various bits of your legal identity.
FUTURE: Non-conspiracists could consolidate pertinent info in one place."

  Get that? If you don't want the government tax man to see your bank
balance and a record of how many times you've flown to Zurich or the Cayman
Islands, if you don't want the theater manager to see your alimony payments
or your concealed-carry handgun permit, if you don't want your boss to see
your prescription for post-cancer-surgery drugs, if you don't want EVERYONE
to gain a precise accounting of how much you spent last month at
Frederick's of Hollywood, or renting X-rated videos, or shacked up in a
motel room across town, or purchasing alcoholic beverages, or buying
vaginal contraceptive foam (including which brand you prefer), why, you're
just some loony "conspiracist."

  Also note that "could" ... as though we'll still have any choice.

  But why worry? Digital cash will be great, argues Joshua Cooper Ramo in
the big "Future of Money" piece in the April 27 Time:

  "Think about the $2,000 check you send to your daughter at college for
expenses. How is that money really spent? Books ... or beer? Electronic
cash takes that relatively simple transaction -- passing an allowance --
and makes it into a much more intelligent process. ...

  "Your daughter can store the money any way she wants -- on her laptop, on
a debit card, even (in the not too distant future) on a chip implanted
under her skin. And, perhaps best of all, you can program the money to be
spent only in specific ways. You might instruct some of the digits to go
for books, some for food and some for movies. Unless you pass along a few
digits that can be cashed at the local pub, she'll have to find someone
else to buy the drinks."

  Ha ha. Kind of cute, isn't it? But look again. Isn't the underlying theme
one of "control"? Try substituting a different scenario for Mr. Ramo's. How
about: "Think about the $1,000 Social Security check your agency sends a
retiree in Las Vegas. How is that money really spent? Food and lodging ...
or blackjack, roulette, and Margaritas?"

  If the purpose of government retirement insurance is to make sure old
folks have food and a roof over their head, doesn't the government have an
OBLIGATION to "earmark" portions of those checks so they can only be used
to buy certain things, once the new e-cash technology gives them that
capability? Couldn't we set e-cards to freeze a recipient's account if she
tried to use any of the "money" to pay for a second prescription of pain
pills written by a doctor other than her ASSIGNED doctor, or to buy a
naughty book about how to evade taxes, or how to move money into offshore
accounts?

  For that matter, what if your boss started earmarking parts of your
electronic paycheck for rent or groceries -- at certain stores that pay for
the consideration -- all "for your own good," you understand? After all,
the kind of soccer moms who elected Bill Clinton can be counted on to favor
almost (start ital)any(end ital) additional Big Brother controls over those
irresponsible men in their lives, frittering away their paychecks on bar
tabs, dirty magazines, power tools, and fancy chrome doo-dads for their
pickup trucks.
 

    #   #   #

  Donald S. McAlvany, editor of the economic and geopolitical newsletter
"The McAlvany Intelligence Advisor," is a fellow who has been looking into
the move toward trackable "electronic cash" for some time. The lead article
in the July, 1998 edition of his 16-page newsletter is headlined "Toward a
Cashless Society: Implementing an Electronic Currency in America," and
spells out a very different view of these developing trends from the one
embraced by the jovial publicists at Time:

  "The global socialists who dominate America and most of the governments
of the western world today (especially Western Europe) have long had a goal
of moving the world away from the use of cash and into an electronic funds
currency system, wherein virtually all cash in use is 'electronic
currency,' " writes Mr. McAlvany. "If all financial transactions are forced
through an electronic banking system ... the ultimate 'people control'
system could be established. ..."

  Citing George Orwell's classic novel "1984," Mr. McAlvany reminds us:
"Privacy is a major element of freedom, without which people and nations
cannot remain free. Today, we have dozens of privacy-destroying systems
being put in place by governments all over the world. They include video
camera surveillance in public places; electronic eavesdropping on
computers, phones and faxes; dozens of computerized files on each adult
American - compiled from credit card, banking, and tax records; physical
surveillance of homes, in whole areas via satellite, helicopters, and other
aircraft; the growing use of Social Security numbers to extract all kinds
of information on Americans from  business, banking, and government data
cases; photo IDs required at airports; and the push by the Clinton
Administration for a computerized (smart card) national identification card
for all U.S. citizens.

  "But the greatest privacy-destroying system of all, one which would have
made Big Brother's, Adolf Hitler's, Mao's, Lenin's or Stalin's mouths water
is the elimination of cash and the forcing of all citizens into the
computerized banking system for (start ital)all(end ital) transactions.
Ultimately these transactions can be monitored, recorded, profiled, and
used in 'people control.' If all of your personal transactions can be so
tracked, a socialist government bent on identifying, profiling and
controlling its 'politically incorrect' citizens or 'religious fanatics' or
Bible-believing Christians; gun owners; critics of the government; non-tax
compliers, can easily scrutinize and build a profile on such individuals.
It can also, in the absence of a cash-spending alternative, deny the
privilege to buy and sell to those who are politically or religiously
incorrect."

  Since one of the main problems banks may have during the anticipated
computer crisis brought about by the turning of the century is clearing
checks written on other banks -- banks whose computers may not agree with
the home bank's "fix" for the transition from year date 99 to year date 00
-- Mr. McAlvany suggests that crisis might present a perfect opportunity to
effectively require bank customers to change over from paper checks to
"electronic cash."

  "Remember that during the financial crisis of the 1930s, when Franklin
Roosevelt presented the American people with the alternative of a bank
holiday/gold confiscation/Draconian financial controls (start ital)or(end
ital) financial destruction, they willingly chose the former and gave up a
major portion of their financial freedom."
 

    #   #   #

  The removal of cash, of course, will be advertised as having many
benefits. Since drug dealers buy and sell their product with suitcases full
of hundred-dollar bills, it will be alleged that the switch will end the
drug trade (as though a multi-billion-dollar industry won't promptly hire
both fancy accountants and computer geniuses to figure out how to "go
electronic" without throwing blips on the IRS radar screens -- or as though
they won't just add newly "illegal" hundred-dollar bills to the list of
contraband they now freely move outside official channels.)

  Expect a public relations campaign to expose the "health hazard" of all
those dirty pennies and nickels you have lying around the house. Passed
from hand to hand among AIDS patients and tuberculosis-ridden junkies, how
can you let your children handle such stuff? Instead, buy Sean and Alysson
a new pair of color-coordinated, his-and-hers Kiddie Smart Cards, which
neatly deduct exactly $1.77 from their accounts when they buy lunch at
school, without burdening them down with filthy, wasteful, inconvenient
(and expensive to produce) coins ... coins they might otherwise save up,
after all, to buy dirty magazines, or reefer, or who knows what else?

  Yep, it's all for your health, safety, and convenience. And why would
anyone object ... unless, of course, they had something to (start
ital)hide(end ital). What was your name again? And could I have your
18-digit bank tracking number, please? You (start ital)are(end ital) in
this country legally, aren't you? Not some kind of a federal
fugitive/deadbeat dad? There, that's better. See how easy things are when
you cooperate? Just slide your card through the security/debit slot. Now
pass your wrist over the scanner to make sure your embedded personal chip
has the matching security code. Thank you; you may now move along. We know
you have a choice when you dine out; thank you for patronizing Burger
World.
 

    #   #   #

A full transcript of the "smart card online forum" session referred to at
the beginning of this essay, as well as a biography and smart card white
paper from each chat participant, can be accessed at
http://www.golinharris.com/mastercard.

Subscriptions to The McAlvany Intelligence Advisor ("in no way involved in
the tax resistance, militia, or sovereign citizens movements in the U.S.")
run a substantial $115 per year. Send subscription info to P.O. Box 84904,
Phoenix, Ariz. 85071, or telephone 800-528-0559.
 

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. Vin's
twice-weekly newspaper column, "The Libertarian," is syndicated in the
United States and Canada via Mountain Media Syndications, P.O. Box 4422,
Las Vegas Nev. 89127. Watch for Vin's book, "Send in the Waco Killers,"
coming from Huntington Press in early 1999.

***

Vin Suprynowicz,   vin@lvrj.com

Education rears disciples, imitators, and routinists, not pioneers of
new ideas and creative geniuses.  The schools are not nurseries of
progress and improvement, but conservatories of tradition and unvarying
modes of thought. -- Ludwig von Mises

The most difficult struggle of all is the one within ourselves. Let us not
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil.  He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943

* * *
 
 

"A great industrial Nation is controlled by its system of credit. Our system of credit is concentrated. The growth of the Nation and all our activities are in the hands of a few men. We have come to be one of the worst ruled, one of the most completely controlled and dominated Governments in the world-no longer a Government of free opinion, no longer a Government by conviction and vote of the majority, but a Government by the opinion and duress of small groups of dominant men." "I have been deceived." "I have betrayed my country."

Woodrow Wilson
28th U.S. PRESIDENT 1913-21
Ref. To passing of Fed.Res.Act
 

Americans mull national ID cards

October 31, 2001 Posted: 3:45 PM EST (2045 GMT)

October 31, 2001 Posted: 3:45 PM EST (2045 GMT)

From Steve Young
CNNfn

NEW YORK (CNN) -- National identification cards have long been considered an abridgment of freedom in the United States. But public support may be building for them since the September 11 terrorist attacks.

Some 70 percent of the U.S. public supported a system of national ID cards, saying they might help prevent terrorist acts, in a Pew Research Center for the People & the Press survey of 1,200 adults in late September soon after the attacks.

The issue has convinced some liberals to support the idea, including famous lawyer and author Alan Dershowitz.

"A limited national ID card, which would have the name, the address, the Social Security number, the photograph and a print fingerprint or retinal print, matchable to a computer chip, would simply make identity theft impossible. It would eliminate the need for any kind of racial or ethnic profiling," said Dershowitz, a Harvard law professor.

But one well-known libertarian think tank, Washington's Cato Institute, does not support the concept.

"The national ID card system is really sort of the ultimate dragnet device," said Tim Lynch, the institute's director of criminal justice studies. "It would require over 250 million Americans to surrender some of their privacy, some of their freedom for a system that I do not think will stop the terrorists from committing acts of violence here against the United States."

The program would not work, Lynch said, because terrorists could bribe card issuers and card inspectors, or they could recruit young people with spotless records.

Such drawbacks have not stopped a host of European countries, including Germany, France and Spain, from adopting ID systems.

In the United States, a massive database would be required for such a system. One computer program company said it would give the software to the government for free.

"We have to give them the tools, databases, cards and the latitude to protect us, and if we do, our liberties and our lives will be saved together," said Larry Ellison, chief executive officer of the California-based Oracle Corp.

Advocates said it would be important to guard against too much information being required or shared. Critics said they predict ID cards would be required at airports first and then additional places in what they call "function creep."

____________

From www.bibleplus.org

Various Identification Schemes

It's a well known fact that when a dictator takes over nation, profiling of a nation's citizens are done.  This is done to determine who are opposed to going along with the new dictator or his philosophies.  Then, those opposed to the regime are systematically tracked down and imprisoned or "exterminated".

This took place within our century by Adolph Hitler in Germany, as well as Stalin in Russia.  Pol Pot's regime attempted to exterminate all intellectuals, trying to return to an agrarian society of slaves to the leaders.  The Germans maintained accurate lists of those they wanted to destroy and when laws were passed "outlawing" Jews, Christians and varous "undesireables", the roundup quickly began.

There is a relentless movement afoot at the moment to identify, categorize and profile the people of the world.  Much of this effort stems from "financial" and government entities.  The various forms this can take include:

Recent proposed regulations provides a more active framework where your finances can be siezed upon suspicion rather than due process of law:  Financial Profiling Makes Your Bank a Snoop

Let's review these for those not familiar with them.

Remember that once a government issues you a card or ID, it has the right to stop you at any time to verify the contents of that card or ID.

National Health ID Card - Hillary Clinton and Company first proposed a National ID Card scheme to insure that everyone could have access to medical care.   Wisely the legislators voted this down as it would be far to expensive.   Privacy issues were raised as well.  Legislation aside, a trial was rolled out in three cities, Bismarck, North Dakota; Cheyenne, Wyoming; and Reno, Nevada.  For more details, click here.

The Driver's License/ID Card concept is commonly used in much of the rest of the world.   Recently an effort by the National Traffice and Safety Administration to implement a such new card was inundated by feedback from concerned citizens, causing Congress to defund that portion of its budget.  However, as with the Heatlh ID Card, efforts will continue to move forward with this card.  Click here for more details.

Retinal Scans - The Retina of the Eye contains many unique features to an individual, similar to a fingerprint.   Work is being done to identify users at points of transaction such as an ATM or grocery store check out stand via retinal scans.

Facial Feature Scans - Systems are now being installed and given a trial run at computers being able to pick out a face belonging to a "wanted criminal" from a crowd of people.  Useful for identifying people as they pass through a doorway, they commonly look at the features directly surrounding the eyes as being the most consistent.  Click here for more details.

Fingerprint Scans - These are becoming more prevalent as security measures for companies and areas where security is desired.   In some IRS offices, a person cannot enter without first giving up his or her thumbprint as an ID.  That ID is then compared vs. a national database.  The use of a fingerprint, generally a thumbprint on Driver's Licenses and other forms of ID is rapidly growing.  Naturally, it is the hope of regulators to have thumbprints of all its citizens in a national database for law enforcement usage.  In many banks, if you are not a customer, you cannot cash a check without giving up your thumbprint.   Refusing to give a thumbprint may be grounds for a bank to refuse to cash a check and call the police, even if you have provided other ID such as a driver's license.

Invisible Bar Codes - Bar codes of this nature have been used for years to identify fingerling salmon and other fish.   In short, a quick burst of laser light tatoos a bar code onto the surface of the item or person to be identified.  Invisible under normal lighting, the bar code is easily read by scanners.  On Oct. 18, 1998 while this author was teaching a class on the mark of the beast, a student related that a friend who worked at a grocery store had served a customer several weeks earlier who after she gave him the total, ran his hand over the scanner, entering his identification information and completing the transaction.   He smiled and said it was "experimental". 
     Ironically, the most common bar codes, known as UPC symbols and commonly found on most grocery store items, are constructed around a trio of 6 sets of elements (666).  When Colonol Bo Gritz (a U.S. Presidential contender) was investigating why this was, the developers stated that they could have used any trio of numbers, but chose the trio of 6.  This conceivably could fulfill part of the prophecy for a mark of 666 on the hand or forehead (i.e. areas that are not generally covered).

An Implanted ID Chip - While unfamiliar to many, the ID Chip has been used for several years for animals, especially dog and cats.  Usage of chips in people for tracking purposes and potentially for financial purposes is going through experimental and developmental phases. In New York City in October 2000 at an invitation-only event, a diminutive, high-tech microchip device will be available commercially. The tiny mechanism slightly smaller than a dime could be implanted under the skin. It is actually a transmitter powered by the host’s muscle and can be followed by global positioning satellites.   Click here to learn more.

Financial Profiling Makes Your Bank a Snoop - Ominously for privacy and freedom advocates, recently (~ December 8, 1998) the Federal Reserve Board (FRB), the Federal Depositors Insurance Corporation (FDIC) and the Office of Comptroller of Currency (OCC), published similar but slightly different notices of proposed rule-making, requiring banks to profile their customers.  Each customer would be profiled electronically and then transactions that would be deemed out of the ordinary would be flagged for further investigation.   Errant accounts could be frozen or seized until innocence was proven.  The public outcry has been loud on this one (over 6500 e-mails to the FDIC alone the first week), but the attitude of the Federal Reserve Board has been to downplay public opposition.  It should be noted that the Federal Reserve Bank (governed by the FRB) is NOT a Federal entity, but rather owned by a number of banking conglomerates.  Click here to learn more.

___________________

 

Detainee?

Miriam Webster

One entry found for detainee.

Main Entry: de·tain·ee 
Pronunciation: di-"tA-'nE, "dE-
Function: noun
Date: circa 1928
: a person held in custody especially for political reasons

Afghan detainees expected in Cuba

January 11, 2002 Posted: 11:34 a.m. EST (1634 GMT)

January 11, 2002 Posted: 11:34 a.m. EST (1634 GMT)

A U.S. Air Force C-17 in Guantanamo Bay, where troops rehearse the arrival process of the detainees.

(CNN) -- The first group of detainees are expected to arrive Friday at the U.S. naval base in Guantanamo Bay, Cuba.

Security was tight at the base as troops awaited the 20 detainees' arrival. On Thursday, the detainees - sedated, hooded and chained to their seats - were flown out of Afghanistan aboard a C-17 transport plane. They were flown to an undisclosed location and then transferred to a C-141 transport for the flight to Cuba.

 

 

 

 

 

Captives

Sedated? Hooded?

When will the Bush Iron Triangle sedate and hood the domestic political opposition?

The sedated, hooded and chained "detainees" are to be held at a makeshift prison at Guantanamo while U.S. officials determine what to do with them. The humanitarian group Amnesty International issued a statement Thursday afternoon objecting to the heavy restraints used on the prisoners during the flight.

All the detainees are being treated as if they were prisoners of war, although the Pentagon has not declared them as POWs under the Geneva Convention. Some of the prisoners taken to Guantanamo likely will face a military tribunal, a prospect that has generated criticism from civil rights advocates.

The detainees were chained to their seats for the 8,000-mile trip and even barred from using the toilets, with special provisions being made so they would not have to get up. They were shaved from head to toe for hygiene considerations

Like animals, Oh but.....God bless Amerika!

The Guantanamo base can currently house 100 prisoners but soon will accommodate 2,000.

Former U.S. Attorney Kendall Coffey said federal courts have ruled that anyone held at Guantanamo has no constitutional rights, such as the right to legal counsel and others given to criminal defendants.

That correct folks, God Bless Amerika, they can be DETAINED, sedated, hooded, shackled, inhumanely kept from toilets, shaved from head to toe, held on a communist island with Communist/US cooperation

But they have no constitutional rights.

``Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction.''
-The constitution of the United States, amendment 13, ratified 1865-Dec-6

THE NEW SURVEILLANCE SOCIETY

WASHINGTON, Feb. 26 —  A Florida technology company is poised to ask the government for permission to market a computer ID chip that could be embedded beneath a person’s skin. For airports, nuclear power plants and other high-security facilities, the immediate benefits would be a closer-to-foolproof security system. But privacy advocates warn that the chip could lead to encroachments on civil liberties.

       THE IMPLANT TECHNOLOGY is another case of science fiction evolving into fact. Those who have long advanced the idea of implant chips say it could someday mean no more easy-to-counterfeit ID cards, no more reliance on dozing security guards.
       Just a computer chip — about the size of a grain of rice — that would be difficult to remove and tough to mimic.
       Other uses of the technology on the horizon, from an added device that would allow satellite tracking of an individual’s every movement to the storage of sensitive data like medical records, are already attracting interest across the globe for tasks like foiling kidnappings or assisting paramedics.
       Applied Digital Solutions’ new “VeriChip” is another sign that Sept. 11 has catapulted the science of security into a realm with uncharted possibilities — and also new fears for privacy.
       “The problem is that you always have to think about what the device will be used for tomorrow,” said Lee Tien, a senior attorney for the Electronic Frontier Foundation, a privacy advocacy group.
       “It’s what we call function creep. At first a device is used for applications we all agree are good, but then it slowly is used for more than it was intended,” he said.


       
SEEKING FDA APPROVAL
       Applied Digital, based in Palm Beach, Fla., says it will soon begin the process of getting Food and Drug Administration approval for the device, and intends to limit its marketing to companies that ensure its human use is voluntary.
       “The line in the sand that we draw is that the use of the VeriChip would always be voluntarily,” said Keith Bolton, chief technology officer and a vice president at Applied Digital. “We would never provide it to a company that intended to coerce people to use it.”

FDA Clears Implantable Chip

Thursday, April 04, 2002

WASHINGTON — A company plans to begin selling a computer ID chip that can be embedded beneath people's skin, now that the Food and Drug Administration has said it will not regulate the implant as long as it contains no medical data.

Applied Digital Solutions Inc. designed the VeriChip — about the size of a grain of rice — to hold information that could be read with special electronic scanners. The company has touted the chip as a potential way to hold a person's medical records or security codes.

Applied Digital had heical device chief, Dr. David Feigal, who made clear that the agency could step in at that point.

If someone is unconscious in an emergency room and implanted medical records are outdated, that could be more dangerous than if doctors had no information, he said. Feigal urged companies considering such health-related implants to consult with the FDA.

For now, the VeriChip will bear only an identification number, said David Hughes of Technology Sourcing International, a consulting firm helping Applied Digital in its discussions with the FDA. But that ID code could be cross-referenced with a database to detail any kind of information.

The company said production would begin immediately.

VeriChip emits a radio signal and has been derided by some for its "Big Brother" implications. Applied Digital has said it could prove invaluable in emergency situations when someone is either unconscious or cannot otherwise give information.

VeriChip is expected to sell for about $200. A scanner used to read information contained in the chip would cost between $1,000 and $3,000. A doctor would insert the chip with a large needle-like device.

___________________

FDA clears implantable chip for market in United States
Thu Apr 4, 2:22 PM ET

PALM BEACH, Florida - The Food and Drug Administration  has cleared the way for Applied Digital Solutions Inc. to begin selling an implantable chip that would contain personal identification and medical data, the company said Thursday.

 
Applied Digital, Palm Beach, said it had received a letter indicating that the FDA does not consider the chip a medical device under its jurisdiction.

VeriChip, a small device about the size of a grain of rice, emits a radio signal and has been derided by some for its "Big Brother" implications. Applied Digital has said it could prove invaluable in emergency situations when a patient is either unconscious or can't otherwise reveal information.

VeriChip is expected to sell for about dlrs 200. A scanner used to read information contained in the chip would cost between dlrs 1,000 and dlrs 3,000.

____________________________________________________________________________________

Family Gets Computer Chips Implanted for Medical Information

FNC

Friday, May 10, 2002

BOCA RATON, Fla. — A Florida family on Friday became the first to be implanted with computer chips that researchers hope will someday become an easy way to provide emergency room staffers with patients' medical information.

 

Jeff and Leslie Jacobs, along with their 14-year-old son, Derek, had the tiny chips implanted in their arms. Each chip is about the size of a grain of rice, and insertion takes about a minute under local anesthesia.

The chips, called the VeriChip, were designed by Palm Beach-based Applied Digital Solutions Inc. They are similar to chips implanted in pets to identify them if they are lost.

The family wanted the implants in case of future medical emergencies.

"We're doing this as a security for us, because we've worked so hard to save my husband's life," said Leslie Jacobs, 46.

Her 48-year-old husband has suffered through cancer, a car crash, a degenerative spinal condition, chronic eye disease and abdominal operations. His injuries have forced him to quit his dental practice.

"It's been really easy and I feel a lot better that I have it," he said after the implant.

The chips used by the Jacobs family contain only telephone numbers and information about previous medications. The data can be read by a hand-held computer and printed out.

The Food and Drug Administration said in April that it would not regulate the implant as long as it contains no medical data. Company officials said they were free to proceed because the implant contains identification numbers that correspond to personal medical information in a separate database.

The FDA did not consider the implant to be a medical device, company officials said. An FDA spokeswoman in Miami did not immediately return a phone call. The FDA had said regulation would be needed if medical records were stored to guard against storage of outdated records.

Company officials hope to eventually include more extensive information. The company says it would be particularly valuable for those who suffer from Alzheimer's disease or others with difficulty providing medical information on their own.

VeriChip is expected to sell for about $200. A scanner used to read information contained in the chip would cost between $1,000 and $3,000.

The chip, which could also be used as a security tool, has stirred debate over its potential use as a "Big Brother" device to track people or invade the privacy of their homes or workplaces.

Jacobs and his family brush aside those arguments. Anyone can be tracked through the Internet and e-mail, credit cards and cellular phones, they say.

___________________________________________________________________________________

 

 

 

A closed-circuit television camera monitors a pedestrian crosswalk in Tampa where police use face-recognition software called FaceIt to compare images of visitors to a mug-shot data base of criminals and suspects.

 

Jan. 3 -- The Mayo Clinic and Honeywell Laboratories have developed a lie detector based on facial thermal imaging technology.

FBI confirms ‘Magic Lantern’ exists

Spokesman says program being developed but not yet in use

MSNBC STAFF AND WIRE REPORTS

Dec. 12 — An FBI spokesman confirmed Wednesday that the U.S. government was working on a controversial Internet spying technology that could be used to eavesdrop on suspected criminals’ computer communications. MSNBC.com first reported in November that the technology, code-named “Magic Lantern,” would allow the FBI to plant a Trojan horse keystroke logger on a target’s personal computer by sending a computer virus over the Internet, a prospect that outraged civil libertarians who said the program could be abused by overzealous law enforcement agencies.

____________________

British News

July 23, 2002

Little Brother's fingerprints all over the library

IT PROMISED to be the high-tech saviour of the embattled primary-school librarian, an ingenious device that guaranteed no more lost library cards and fewer missing books.

All a child had to do to borrow Topsy & Tim for the week was flick a thumb through an unobtrusive fingerprint scanner, so sensitive it could even recognise a pattern from under layers of sticky chocolate.

There was only one snag: in many cases, parents were not told that schools were storing their children’s fingerprints.

Parental outrage followed and, by last night, the school thumb-scanner being used by 1,000 British primary schools was being internationally condemned as a blatant breach of children’s human rights.

The trouble began when the mother of an 11-year-old attending the Sacred Heart Roman Catholic School in Ruislip, West London, discovered that her son had been fingerprinted without her consent.

Furious, the woman, who refused to be named, contacted civil liberties groups such as Privacy International and a child’s advocacy group, Action on Rights for Children in Education (Arch).

Privacy International called for the banning of the library-management software, sold by a Stockport company called Micro Librarian Systems. “This is unethical and disproportionate,” Simon Davies, Privacy International’s director, said.

The assistant information commissioner Phil Boyd said that there had been no breaches of the Data Protection Act, as the thumbprints were reduced to a numerical code.

___________________________________________________________________________________

Privacy fear over plan to store email

EU wants data retained to help fight against crime

Richard Norton-Taylor and Stuart Millar
Tuesday August 20, 2002
The Guardian


Records of personal communications, including all emails and telephone calls, will be stored for at least a year under a proposal to be decided by EU governments next month.

Under the plan, all telecommunications firms, including mobile phone operators and internet service providers, will have to keep the numbers and addresses of calls and emails sent and received by EU citizens. The information, known as traffic data, would be held in central computer systems and made available to all EU governments.

The move could lead to a further extension in the powers of European security and intelligence agencies, allowing them to see the contents of emails and intercepted calls and faxes, civil liberty groups fear.

The plan, drafted in Brussels, has been leaked to Statewatch, an independent group monitoring threats to privacy and civil liberties in the EU.

"The traffic data of the whole population of the EU - and the countries joining - is to be held on record. It is a move from targeted to potentially universal surveillance," Tony Bunyan, Statewatch editor, warned yesterday. "EU governments claimed that changes to the 1997 privacy directive would not be binding on member states - each national parliament would have to decide. Now we know that all along they were intending to make it compulsory across Europe."

Although the move was initially explained by the need to fight terrorism, EU officials now argue it is necessary to fight all serious crime, including paedophilia and racism.

A "draft framework decision" for the European council states that it is essential for all member states to apply the same rules. It said that the purpose was to harmonise the retention of traffic data to allow criminal investigation.

The decision is a victory for the UK which, encouraged by Washington, has been pushing for a compulsory EU-wide data retention regime.

But civil liberties campaigners claim that compelling communications companies to retain the records of all their customers for long periods amounts to blanket surveillance on the entire EU population and will lead to law enforcement agencies conducting "fishing expeditions" against innocent citizens.

The EU admits the plan involves an invasion of privacy but says the periods for which it must be retained - a minimum of 12 months and a maximum of 24 months - is "not disproportionate".

The data would include information identifying the source, destination, and time of a communication, as well as the personal details of the subscriber to any "communication device".

For law enforcement agencies to access the data, the draft EU decision gives a minimum list of offences, including "participation in a criminal organisation, terrorism, trafficking in human beings, sexual exploitation of children", drug trafficking, money-laundering, fraud, racism, hijacking and "motor vehicle crime".

It states that the "confidentiality and integrity" of retained traffic data must be "ensured" but does not say how. Individuals have no right to check whether the information held about their personal communications is accurate or legally challenge decisions about its use by EU authorities.

A member state will not be able to refuse a request for information from another member state on human rights or privacy grounds. There is also no common EU list of crimes caught by the plan or of public agencies which could demand the information.

But there is one element in the EU plan that the Britain will not welcome. It says that personal data could be handed to security services and law enforcement authorities only with judicial approval.

In Britain, the regulation of investigatory powers act allows law enforcement and intelligence agencies to access personal communications data covering a wide range of purposes, including public health and tax collection, without any court or executive warrant.

In June, the Guardian revealed plans to extend the powers to access data to all local councils, seven ministries and 11 quangos. David Blunkett, the home secretary, bowing to intense public and political pressure, admitted the government had "blundered" into the issue and that further consultation was needed.

But the legality of the entire data retention framework in this country has been cast into doubt. The information commissioner, Elizabeth France, has warned the Home Office that the new powers could be illegal because another law - the Anti-Terrorism Act rushed through parliament after the September 11 attacks - allows such data to be retained and accessed only on national security grounds. According to legal advice from an eminent QC, this would be illegal under human rights law.

________________________________________________________________________________________________

Why the News Media's shark frenzy on child abductions, all of a sudden.....
 

Girl to get tracker implant to ease parents' fears

Jamie Wilson
Tuesday September 3, 2002
The Guardian


The parents of an 11-year-old girl are to take the extraordinary step of having her fitted with a microchip so that her movements can be traced if she is abducted.

Danielle Duval will have the device implanted in her arm in the next few months, the scientist assisting the plan claimed yesterday. The miniature chip will apparently send a signal via a mobile phone network to a computer, which will be able to pinpoint her location on an electronic map.

The parents, Wendy and Paul Duval from Reading in Berkshire, said they had decided on the step after the abduction and murder of the schoolgirls Holly Wells and Jessica Chapman.

"After the news of Holly and Jessica , we sat down as a family and discussed what we could do," Mrs Duval said. "Like us, Danielle needs to feel that she's safe at all times and could be located in a real emergency. I know nothing is ever 100% or foolproof, but we believe the microchip will go a long way towards protecting her."

Mrs Duval did not accept that the family were panicking or overreacting, saying it was only sensible for a parent to use technology when it was available. "If a car is stolen, it can be fitted with a computer to enable it to be tracked - so why not apply the same principle to finding missing children?" she said.

Yesterday several children's charities said they were unsure about the implant.

A spokesman for Kidscape, the charity aimed at stopping children from being bullied and sexually abused, said: "We do not think this is a good idea. Children should be taught about the possible dangers, rather than having something stuck on them that can maybe track them, and perhaps then only when it is too late."

A spokesman for the NSPCC said: "Parents and guardians must remember child abductions are extremely rare, and that the vast majority of abuse happens within the home."

The designer of the chip, Kevin Warwick of the cybernetics department at Reading University, conceded that some parents might abuse the system or overreact if their children were late home, but maintained that tagging was the correct course of action in the light of recent events.

He said: "The implant won't prevent abductions: nothing will.

"However, if the worst happens, parents will at least be in with a chance of finding their children alive."

He has called for an urgent government debate on the issue, and believes ministers should consider implants for all children.

Professor Warwick said there were a few technological problems to be ironed out, including exactly how to recharge the chip's battery, but he expected Danielle to be fitted with the device, under local anaesthetic by a doctor, in the next few months. "Her parents want me to proceed as quickly as possible, and I wouldn't waste their time if I thought it wasn't capable of working," he said.

Among the technical questions to be addressed is whether the chip should remain dormant in the limb until an emergency arose, or whether it should emit a signal 24 hours a day.

"This is why we need the debate to take place," he said. "In future it may be that only the police have the authority to allow the system to be activated. But, as things stand, parents can have that right themselves."

Danielle, who met the professor with her parents last week, said she had no concerns about being fitted with the chip. "I will feel so much safer knowing that mum and dad could find me in an emergency. The professor said the chip won't hurt, so that's OK."

Mrs Duval, 33, a school catering controller, and her husband, Paul, 34, a driving instructor, want their other daughter, Amy, seven, to undergo the treatment.

"We'll wait until Amy's a bit older, so that she fully understands what's happening," they said.

 

 

 

And you have been lied to once again

And better yet Heil Burning Bush-ka will make certain that his lackeys will so conveniently detain up to two thousand of these human animals in their New concentration camps.

 

Jeffco stores soon to require fingerprints for all check and credit card purchases
by 9NEWS reporter Ginger Delgado, edited by Web Producer Paola Farer

October 02, 2002 - 7:59 AM

JEFFERSON COUNTY - You'll soon have to provide a fingerprint to go shopping in Jefferson County. Consumers using checks or credit cards will have to give their prints to merchants.

It's a new tactic aimed at cracking down on identity theft and catching crooks who use fake IDs. Already, people cashing payroll checks at King Soopers have to give a fingerprint

The touch pads are easy to use and don't leave residue on your finger. Police agencies say the policy has resulted in less check fraud. They are now asking all merchants in the county to require fingerprints.

"The important thing about this to remember is that it doesn't put an honest customer's fingerprint into a database somewhere,” said Sgt. George Hinkle. “The only people that are actually going to have their fingerprints processed are the crooks."

The fingerprints will be kept on file until the transactions clear. If there's a problem, the prints will be passed along to investigators. The new policy will take effect throughout Jefferson County in the next few weeks.

________________________

FDA Says It Won't Regulate Implanted ID Chip
Tue Oct 22, 5:30 PM ET

NEW YORK (Reuters Health) - Sales of an identification chip intended to be implanted in a person's body will resume immediately now that the US Food and Drug Administration  (FDA) has completed its review of the device, the chip's maker Applied Digital Solutions Inc. announced Tuesday.

 

The company made headlines this spring after a Florida family became the first ever to be implanted with VeriChip. The device, about the size of a grain of rice, is implanted under the skin and works by emitting a radio frequency that transmits a unique verification number.

 

The company says the chips could eventually replace medical alert bracelets and cards of the sort that alert emergency medical personnel to conditions such as allergies.

 

Palm Beach, Florida-based Applied Digital Solutions said it received a letter from the FDA ruling that VeriChip is not a regulated medical device "for security, financial and personal identification/safety applications." The decision clears the way for the company to market and distribute VeriChip for those purposes.

 

Applied Digital said it voluntarily suspended its marketing of the device in the US 5 months ago pending FDA review.

_______________________

New twist on Big Brother Moshiach ben David in the UK

http://www.met.police.uk/appeals/mayday/mayday2002.htm

 

Mayday 2002

The Metropolitan Police are seeking your help to identify and trace the suspects pictured here.

During the past three years, major anti-capitalist demonstrations have taken place in Central London on May Day.

A determined minority in these protests have set out to cause major disruption and commit criminal offences including violent disorder and substantial criminal damage.

Members of the public and police officers have also been injured in these disturbances.

Despite extensive inquiries, which have resulted in a number of successful prosecutions, the Metropolitan Police has still to identify and trace a number of individuals believed to be involved in committing these offences and is seeking your help to do so.

Anyone with information about the identity or whereabouts of any of the people pictured here is asked to call the Public Order Team on 020 7239 7329 or Crimestoppers on 0800 555111.


__________

1-10-2003

Diversion

`

It looks as though the current Administration does not need the Clinton proposed Health Identification program after all.
Today one of my employees brough to me a flyer that her young first grade daughter brought home from public school. The Title of this flyer
"This one minute test can save your child's eyes"
Sent out by the school on behalf of Vision Research Corporation
The flyer states " Good vision is important to your childs education. As much as 80% of early learning is obtained visually. That is why a special vision screening program is being done in your child's school.
The test uses a new technology developed by NASA, and it is a simple and fast way to detect problems with your child's eyes.
No child is too young to be screened.
The flyer continues with all of the health benefits regarding eyesight and how  a great good ole NASA is contributing to healthy children.
What they are neglecting to tell the some 2 million childrens parents which have been processed for the One World Government Retina Scanning Database is that the Federal Government is sponsoring this scan scam.
Nor do they tell the parents that VRC has a subsiderary Richardson Electronics "Security Systems Division" or.......
 
 

http://www.afaga.org/GI-5-99.htm

School Vision Screening

Picture of Eye may be used as I.D. - Gives more Information than Retina Scan

The eyes are categorized as sense organs and are specialized parts of the nervous system. As distance receptors, they show us what’s happening at a distance from our bodies. The retina, containing thousands of special cells called rods and cones, is the part of the eye that receives light. There have been rumblings that retina scans* may be used for identification purposes.

While many Georgians have fought vigorously and unsuccessfully to overturn the current requirement for fingerprints on drivers’ licenses, perhaps they have not noticed that the law also allows government to require any other identifying information not listed in the fingerprint law, such as the retina scan and DNA analysis.

Bank United in Texas** has an automatic teller that requires customers to simply look into a specific place on the machine and, eureka, the customer is identified and the machine promptly emits the cash.

But, retina scans aren’t the most comprehensive or the latest method of using eyes for identification purposes. NASA developed a vision screening process that takes a picture of the inner eye by using the state-of-the-art technique of color photorefraction, a spin-off from the Hubbell Telescope technology.

Georgia Connection: 150,000 Students to get New Vision Screening with I.D. capability

The State Board of Education has contracted with Vision Research Corporation in Birmingham, Alabama to use this technology for 150,000 students at a cost of $7.00 each. To pay for it, the legislature appropriated $1,407,729 for 1999 for first and second graders and $591,408 for FY2000. The contract reveals that federal funding covers 50 percent or $525,000 of the $1,050,000. That fact alone reveals the federal interest in photographing student eyes. You may ask, "Why would they do that?"

Consider this . . .

(1) A fingerprint has only 35 identifying factors. The eye has 266. (b) At least one bank is already using the eye as identification for banking transactions. (c) Georgia law allows unlimited requirement for I.D. information on drivers’ licenses. (d) The possibility of a national I.D. card looms closer and closer. (e) A picture of the inner eye is intensely individualistic and may be used for identification purposes.

Who gets the picture of the child’s eye?

  1. Vision Research Corporation keeps the picture and its analysis.

    The contract requires them to keep records for five years. The only restriction on dissemination of information is that they must comply with federal and state confidentiality requirements or get permission from the state DOE to sell or otherwise disseminate it.

  2. The federal and state governments that fund the process will, obviously, get the picture and analysis.
  3. Schools will receive results on each child.

    A call to Vision Research revealed that pictures are sent to schools to be kept in each child’s record.

  4. Parents will be sent individual printed results sheets but no mention is made of their receiving the picture.
  5. The Department of Education receives a final report and a statistical summary along with other information.

The contract states, "That all reports, graphs, drawings, computer disks, specification, estimates, and other data prepared by the Contractor under the terms of this Agreement shall be delivered to, become and remain the property of the Department [of Education] upon termination or completion of the work."

ALSO, "The Department shall have the right to use the same without restriction or limitation and without compensation to the Contractor other than that provided for in this Agreement. The Contractor shall not have the right to use same for sale or other benefit without express written permission from the Department."

NOTE: (1) The State Department of Education (DOE) receives information obtained by Vision Research.

(2) The DOE has unrestricted use of the information.

(3) The DOE may give Vision Research permission to sell the information.

 

*Retina scans measure retina and optic nerve topography but this technology uses color photorefraction, a by-product of the Hubbell Telescope technology. This new process gives far more information of the entire eye than retina scans do.

**In reporting the Bank United story in his May 14 radio commentary, Paul Harvey pointed out that the human eye has 266 distinguishable characteristics compared to a fingerprint’s mere 35 identifiable points.

Georgia Insight 3 May 1999

 

Yes they will have that Identification Data Base whether the United States wants it or not. The Bush-ka Administration may be the last presidency of the Republic of Freedom.

Response from Vision Research Corporation 1-10-2003

Robert --

Thank you for bringing the "Georgia Insight" May 1999 article to our attention.  Please be aware that the insinuations of that article and the general premise of your email are incorrect, as are various key "facts" cited there.

People are free to believe what they want, but if you're looking for the truth, this isn't it. 

The program you are referring to has no other purpose than to identify vision problems that can adversely affect children.  It has found tens of thousands of children with vision problems, and it has made a difference that will benefit them for a lifetime.

Jim Kennemer

_______________

Response from avoice@mtangel.net

STEP UP TO THE BEAST - LOOK INTO ITS FACE - GET FED
Couldn't be a more direct mind control/pavlovian dog effect on children than
this to condition them to compromise their bodies and personal information
to the state. These are GLOBAL programs.  In the schools they are already
using retina biometrics for the children to get their lunches and library
materials at school.

Bushs "No Child Left Behind" also is demanding school database information
for draft purposes, as well as all the other "human managment" programs they
have planned for us - the schools don't get the federal money unless they
comply

ALL information gathered now is shared - there is NO private database)

________

RFID tags: Big Brother in small packages

By Declan McCullagh
January 13, 2003, 6:26 AM PT


Could we be constantly tracked through our clothes, shoes or even our cash in the future?

I'm not talking about having a microchip surgically implanted beneath your skin, which is what Applied Digital Systems of Palm Beach, Fla., would like to do. Nor am I talking about John Poindexter's creepy Total Information Awareness spy-veillance system, which I wrote about last week.

Instead, in the future, we could be tracked because we'll be wearing, eating and carrying objects that are carefully designed to do so.

 

The generic name for this technology is RFID, which stands for radio frequency identification. RFID tags are miniscule microchips, which already have shrunk to half the size of a grain of sand. They listen for a radio query and respond by transmitting their unique ID code. Most RFID tags have no batteries: They use the power from the initial radio signal to transmit their response.

You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, Calif.

Alien Technology won't reveal how it charges for each tag, but industry estimates hover around 25 cents. The company does predict that in quantities of 1 billion, RFID tags will approach 10 cents each, and in lots of 10 billion, the industry's holy grail of 5 cents a tag.

It becomes unnervingly easy to imagine a scenario where everything you buy that's more expensive than a Snickers will sport RFID tags, which typically include a 64-bit unique identifier yielding about 18 thousand trillion possible values. KSW-Microtec, a German company, has invented washable RFID tags designed to be sewn into clothing. And according to EE Times, the European central bank is considering embedding RFID tags into banknotes by 2005.

It becomes unnervingly easy to imagine a scenario where everything you buy that's more expensive than a Snickers will sport RFID tags.
That raises the disquieting possibility of being tracked though our personal possessions. Imagine: The Gap links your sweater's RFID tag with the credit card you used to buy it and recognizes you by name when you return. Grocery stores flash ads on wall-sized screens based on your spending patterns, just like in "Minority Report." Police gain a trendy method of constant, cradle-to-grave surveillance.

You can imagine nightmare legal scenarios that don't involve the cops. Future divorce cases could involve one party seeking a subpoena for RFID logs--to prove that a spouse was in a certain location at a certain time. Future burglars could canvass alleys with RFID detectors, looking for RFID tags on discarded packaging that indicates expensive electronic gear is nearby. In all of these scenarios, the ability to remain anonymous is eroded.

Don't get me wrong. RFID tags are, on the whole, a useful development and a compelling technology. They permit retailers to slim inventory levels and reduce theft, which one industry group estimates at $50 billion a year. With RFID tags providing economic efficiencies for businesses, consumers likely will end up with more choices and lower prices. Besides, wouldn't it be handy to grab a few items from store shelves and simply walk out, with the purchase automatically debited from your (hopefully secure) RFID'd credit card?

The privacy threat comes when RFID tags remain active once you leave a store. That's the scenario that should raise alarms--and currently the RFID industry seems to be giving mixed signals about whether the tags will be disabled or left enabled by default.

In an interview with News.com's Gilbert last week, Gillette Vice President Dick Cantwell said that its RFID tags would be disabled at the cash register only if the consumer chooses to "opt out" and asks for the tags to be turned off. "The protocol for the tag is that it has built in opt-out function for the retailer, manufacturer, consumer," Cantwell said.

Wal-Mart, on the other hand, says that's not the case. When asked if Wal-Mart will disable the RFID tags at checkout, company spokesman Bill Wertz told Gilbert: "My understanding is that we will."

Cantwell asserts that there's no reason to fret. "At this stage of the game, the tag is no good outside the store," he said. "At this point in time, the tag is useless beyond the store shelf. There is no value and no harm in the tag outside the distribution channel. There is no way it can be read or that (the) data would be at all meaningful to anyone." That's true as far as it goes, but it doesn't address what might happen if RFID tags and readers become widespread.

If the tags stay active after they leave the store, the biggest privacy worries depend on the range of the RFID readers. There's a big difference between tags that can be read from an inch away compared to dozens or hundreds of feet away.

The privacy threat comes when RFID tags remain active once you leave a store.
For its part, Alien Technology says its RFID tags can be read up to 15 feet away. "When we talk about the range of these tags being 3 to 5 meters, that's a range in free space," said Tom Pounds, a company vice president. "That's optimally oriented in front of a reader in free space. In fact if you put a tag up against your body or on a metal Rolex watch in free space, the read range drops to zero."

But what about a more powerful RFID reader, created by criminals or police who don't mind violating FCC regulations? Eric Blossom, a veteran radio engineer, said it would not be difficult to build a beefier transmitter and a more sensitive receiver that would make the range far greater. "I don't see any problem building a sensitive receiver," Blossom said. "It's well-known technology, particularly if it's a specialty item where you're willing to spend five times as much."

Privacy worries also depend on the size of the tags. Matrics of Columbia, Md., said it has claimed the record for the smallest RFID tag, a flat square measuring 550 microns a side with an antenna that varies between half an inch long to four inches by four inches, depending on the application. Without an antenna, the RFID tag is about the size of a flake of pepper.

Matrics CEO Piyush Sodha said the RFID industry is still in a state of experimentation. "All of the customers are participating in a phase of extensive field trials," Sodha said. "Then adoption and use in true business practices will happen...Those pilots are only going to start early this year."

To the credit of the people in the nascent RFID industry, these trials are allowing them to think through the privacy concerns. An MIT-affiliated standards group called the Auto-ID Center said in an e-mailed statement to News.com that they have "designed a kill feature to be built into every (RFID) tag. If consumers are concerned, the tags can be easily destroyed with an inexpensive reader. How this will be executed i.e. in the home or at point of sale is still being defined, and will be tested in the third phase of the field test."

If you care about privacy, now's your chance to let the industry know how you feel. (And, no, I'm not calling for new laws or regulations.) Tell them that RFID tags are perfectly acceptable inside stores to track pallets and crates, but that if retailers wish to use them on consumer goods, they should follow four voluntary guidelines.

First, consumers should be notified--a notice on a checkout receipt would work--when RFID tags are present in what they're buying. Second, RFID tags should be disabled by default at the checkout counter. Third, RFID tags should be placed on the product's packaging instead of on the product when possible. Fourth, RFID tags should be readily visible and easily removable.

Given RFID's potential for tracking your every move, is that too much to ask?

________

Michelin Embeds
RFID Tags In Tires

From RFID Journal
1-21-3

Michelin this week revealed that it has begun fleet testing of an RFID transponder embedded in its tires to enable them to be tracked electronically. After it completes testing, which will likely last 18 months, Michelin will begin offering automakers the option of purchasing tires with embedded transponders.
 
The US Congress passed the TREAD (Transportation, Recall, Enhancement, Accountability and Documentation) Act in the wake of the Firestone/Ford Explorer debacle. The act mandates that car makers closely track tires from the 2004 model year on, so they can be recalled if there's a problem. This technology could be available for the 2005 model year.
 
Michelin hopes manufacturers will pay a little more for tires with RFID transponders, because it makes the tires easier to track. The microchip stores the tire's unique ID, which can be associated with the vehicle identification number. The chip can also store information about when and where the tire was made, its maximum inflation pressure, size and so on. Information can be updated with a handheld reader.
 
Other tire makers have demonstrated the ability to read RFID transponders embedded in tires. But Michelin claims to be the first to meet the Automotive Industry Action Group's B-11 standard for North America, which calls for a read distance of 24 inches. Achieving that range has been a challenge because the rubber makes it harder to read the tag.
 
When Michelin took off-the-shelf, passive UHF transponders and embedded them in tires, the read distance dropped to less than three inches, according to George O'Brien, Michelin's North American technical director for electronic products and services. To boost the read range, the company took microchips from Fairchild Semiconductor and Philips Semiconductor and designed its own special antenna.
 
O'Brien would not reveal details, but he said the antenna was designed to compensate for the fact that electromagnetic waves travel differently through rubber than through air. He said the transponder that his team designed loses only 10 percent of its read range when it is embedded in a tire.
 
The other key issue was to ensure that the rubber bonds to the antenna. Michelin developed a proprietary coating it puts on the transponders before putting them into the rubber. "The most important concern is making sure the tire is not compromised in any way," O'Brien says. "You have to make sure the rubber bonds carefully to antenna so the wire that the antenna is made from doesnít break and then work its way out of the sidewall of the tire."
 
The tire is now being tested in several areas of the country by taxi and rental car fleets. Michelin says the transponders cost "several dollars" today, but the price will drop if they are manufactured in mass volumes (Michelin manufactures more than 800,000 tires a day). It's not clear yet whether automakers will be willing to pay the additional cost.
 
The Fairchild and Philips chips are based on Intermec's Intellitag. Saleem Miyan, Philips global strategic business manager for RFID products, says his company made some refinements to the Intellitag design, which it has licensed from Intermec.The Philips I-Code HSL chip operates at 868-915 MHz stores about 2 kiliobytes of information. It is currently available only in sample quantities. it will be mass-produced starting in the middle of the year.
 
Philips and Texas Instruments have also developed pressure and temperature sensors that use battery-powered RFID tags to communicate with a reader in the dashboard. That enables the driver to know when the pressure of one particular tire drops below a certain level (see RFID Chip To Monitor Tire Pressure). The Michelin transponder is strictly for identification and tracking.
 
http://www.rfidjournal.com/article/articleview/269/1/1/

Darpa's Pyramid page of the Babylonian Talmudic Order.

The Domestic Dissenter Tracking System

TIA graphic

 

Take everyone's DNA fingerprint, says pioneer

By Steve Connor in Long Island, New York

03 February 2003

Everybody in Europe and the US should have their genetic fingerprints entered into an international database to enable law enforcement agencies to fight crime and terrorism in an unstable world, according to James Watson, the co-discoverer of the DNA double helix.

In an exclusive interview with The Independent to mark the 50th anniversary of his discovery, the scientist said the risks posed by terrorists and organised criminals now outweighed the possible objections on civil liberties grounds to a DNA database.

"It is not that I am insensitive to the concerns about individual privacy or to the potential for inappropriate use of genetic information, but it would make life safer," Professor Watson, the president of the Cold Spring Harbor Laboratory in New York, said.

As the first director of the Human Genome Project, Professor Watson set aside funds to examine the potential ethical concerns relating to the misuse of genetic information. DNA fingerprints, which do not contain medical information and are merely used to establish a person's identity, pose fewer threats, he said.

"The sacrifice of this particular form of anonymity does not seem an unreasonable price to pay, provided the laws see to a strict and judicious control over access to public data," he said. "It would be harder to be a crook. If you want to make the criminal justice system more fair, what's wrong with it?"

Europe and the US could introduce such a database relatively cheaply and easily, he said. "It's hard to imagine that in 100 years from now we won't have it. With the increase in terrorism, we want to know who people are."

Many people might object out of an irrational fear of DNA, which has a "voodoo quality", he admitted. "A lack of understanding of genetic complexities leaves one susceptible to the worst anxieties and conspiracy theories."

Professor Alec Jeffreys of Leicester University, who developed DNA fingerprinting in the 1980s, also called for a national DNA database for crime fighting in a speech last year at the Science Festival. Since its development, the fingerprinting technique has become one of the most powerful tools in forensic science.

________

Barcoding humans

The era of implanting people with identity chips is up on us

By Angela Swafford, Globe Correspondent, 5/20/2003

The painless procedure barely lasted 15 minutes. In his South Florida office, Dr. Harvey Kleiner applied a local anesthetic above the tricep of my right arm, then he inserted a thick needle deep under the skin.

 

''First we locate a prime spot,'' he said. ''The next thing is to release the button that triggers the injection mechanism, and that's it, the cargo's been delivered.''

The ''cargo'' was a half-inch-long microchip inside a glass and silicone cylinder that carries my permanent identification number. For an instant, I remembered the famous scene in the movie ''Fantastic Voyage'' in which a miniaturized Raquel Welch and her companions are inserted, submarine and all, into the vein of a patient. In my case, the tiny chip inside me can transmit personal information to anyone with a special handheld scanner.

Theoretically, this VeriChip will allow doctors to call up my medical records even if I'm too badly hurt to answer questions. It is also supposed to allow me to get money from an automatic teller machine by flashing my arm instead of punching in my PIN number. Or reassure airport security that I am a journalist, not a terrorist.

And, though the VeriChip strikes critics as Orwellian, its makers think the surgically implanted IDs could be the Social Security numbers of the future in a nervous world.

''I believe the day will come when most of us will have something similar to the VeriChip under our skin,'' said Scott Silverman, president of Florida-based Applied Digital Solutions. ''People will regard that its benefits -- in terms of financial, security, and health care -- far outweigh the possibility of loss of privacy.''

Right now, I am part of a very small club, the 18th person in the world -- and the first journalist -- to get ''chipped.'' Most of the others are ADS employees along with one Florida family who have been jokingly dubbed ''the Chipsons'' in a play on the old Jetsons cartoon.

The idea of a system that gives emergency workers and others immediate access to potentially lifesaving information is exactly what drew the Jacobs family of Boca Raton to the VeriChip. At the request of their 14-year-old son, Derek, the Jacobses got chipped last year.

''My husband has cancer and we've experienced the frustrating delays of trying to provide urgent medical history information every time he is rushed into the emergency room,'' says Leslie Jacobs.

Since the attack on the World Trade Center on Sept. 11, 2001, she continues, ''we know that our lives are increasingly vulnerable. If we want increased safety, security, and peace of mind, we need to take positive steps. We've decided that having a VeriChip is one way to do just that.''

But critics see surveillance technology like the VeriChip as a growing threat, giving potentially dangerous new power to businesses and government alike. In a report issued in January by the American Civil Liberties Union, Jay Stanley and Barry Steinhardt warned that an explosion of technology has already created a ''surveillance monster.''

''Scarcely a month goes by in which we don't read about some new high-tech way to invade people's privacy, from face recognition to implantable microchips, data mining, DNA chips, and even `brain wave fingerprinting,' '' they wrote. ''The fact is there are no longer any technical barriers to the Big Brother regime portrayed by George Orwell [in his novel `1984'].''

The VeriChip is similar to the more than 25 million chips already embedded in animals all over the world acting as ''pet passports,'' allowing customs officials to monitor those animals that do not need to go into quarantine, or to identify your stray dog.

But, at least for now, the VeriChip does much less: it's mainly for demonstration purposes, carrying only an identification number and the capacity for about three paragraphs of information. Only 10 hospitals and doctors in Florida have the scanner to read the chips. And the Food and Drug Administration has not yet approved the chips for use in health care, so they cannot be used to access medical records.

However, ADS officials say this is just the beginning. They want to build a chip that can store loads of information, or act as the key to a central database that stores information about the user. Ultimately, the company hopes to be able to track the movement of people with chips worldwide using global positioning satellites.

The company is field testing its Personal Locator Device, or PLD, which ADS says could help track lost children, sick elderly family members, mountain climbers who get lost, or kidnap victims. Company officials say they have been inundated with requests from private companies in Latin America, especially Mexico and Colombia.

The PLD is still years away from wide use, according to Keith Bolton, ADS's chief of technologies. The working prototype is rather large -- 2 1/2 inches in diameter -- and would require major surgery for implantation (though it appears some Israeli secret service agents already carry something similar). It is powered by a pacemaker battery, and, just like in a Tom Clancy book, it would let anyone with access to the PLD system follow the wearer anytime, anywhere in the world, at the click of a mouse.

''The PLD would also monitor the vital signs of the wearer, and the environmental conditions around that person, and it could be a great way to protect a family member with a disease such as Alzheimer's,'' says Bolton.

Businesses already use technology to track their products around the world, but we should stop and think about the implications before starting a human tracking system, cautions Mohan Tanniru, professor of information systems at the University of Arizona.

''I am not going to put a chip on my kid thinking that she could be kidnapped,'' he says, ''unless I know the chip will be activated only if I report that my kid is lost. But how do I know that the police are only going to activate it when I say so, and not when they feel like it? You can't just say that technology is bad just because it is there. So it is a matter of deciding what trusting agency should be given that responsibility.''

Tanniru actually thinks that human tracking might be welcome in certain cases, such as following criminals on probation or making sure foreign nationals don't overstay their visas. In fact, Pro Tech Monitoring of Tampa already makes an externally worn tracking device for parolees that alerts authorities if the wearer enters a forbidden area, such as a school zone.

For ADS's Silverman, both the VeriChip and its future GPS-based version are a matter of individual choice.

''No one is forcing you to have a VeriChip. If you want a chip in your right arm you are going to know it is there because you will see it injected. When you look at the events of 9/11 and the way people measure their own personal security today versus the way they did a few years ago, there is a much higher concern to make sure that family members are safe and sound, and some people now put that above privacy rights.''

So far, ADS's technology gamble has not translated into profits. In 2002, ADS lost $112 million on revenues of $96 million, though this loss is significantly lower that that of the previous year.

As far as I am concerned, having a chip with a code in it is not giving me the chills. I think it would be nice to use it to get cash or pay for gas, and I wouldn't mind paramedics having access to my health records in the blink of an eye. Besides, I know it would never get lost. I did, however, have a few questions about its health hazards. So I asked Dr. Kleiner.

''The VeriChip is extremely safe,'' he says. ''Pacemakers are hundreds of times larger and more complicated and nobody has problems with them. To prevent the chip from migrating to another part of the body there is a little polymer at one end of the capsule that will adhere to the skin and hold it in place.

At his office, my arm was like a barcoded product at a supermarket cash register: It beeped every time the scanner prodded the chip. It worked even through my clothes. Displayed on the screen was a long number with many zeroes. For good or bad, I thought, this chip may be quietly heralding a time when people will literally have technology under the skin.

This story ran on page C9 of the Boston Globe on 5/20/2003.
© Copyright 2003 Globe Newspaper Company.

 

 

 

     

    

 

 

Are you with them or, are you against them? That is the question? 

Big Brother Is Watching You -
And Documenting

By Yuval Dror Haaretz.com
9-20-3

 


eBay, Ever Anxious To Up Profits, Bends Over Backward To
Provide Data To Law Enforcement Officials
 
 
 
"I don't know another Web site that has a privacy policy as flexible as eBay's," says Joseph Sullivan. A little bit later, Sullivan explains what he means by the term "flexible." Sullivan is director of the "law enforcement and compliance" department at eBay.com, the largest retailer in the world.
 
Sullivan was speaking to senior representatives of numerous law-enforcement agencies in the United States on the occasion of "Cyber Crime 2003," a conference that was held last week in Connecticut. His lecture was closed to reporters, and for good reason. Haaretz has obtained a recording of the lecture, in which Sullivan tells the audience that eBay is willing to hand over everything it knows about visitors to its Web site that might be of interest to an investigator. All they have to do is ask. "There's no need for a court order," Sullivan said, and related how the company has half a dozen investigators under contract, who scrutinize "suspicious users" and "suspicious behavior." The spirit of cooperation is a function of the patriotism that has surged in the wake of September 11.
 
eBay is the world's largest auction site. Some 62 million registered users buy and sell a variety of merchandise through the site, which charges commissions for every item sold. Sullivan claims that 150,000 Internet users earn their livelihood from the site, some having left their old jobs to become buyers or sellers on eBay.
 
The sales method on the site is simple: An individual registers as a user, types in his particulars, and affirms that he accepts the user conditions and the site's privacy policy. Whenever an item is sold, the buyer fills out an evaluation form, telling other users about the treatment he received, whether the merchandise was sent on time, etc. Other eBay users can then avoid buying from sellers who have received poor grades.
 
Sullivan says eBay has recorded and documented every iota of data that has come through the Web site since it first went online in 1995. Every time someone makes a bid, sells an item, writes about someone else, even when the company cancels a sale for whatever reason - it documents all of the pertinent information.
 
One would think that preserving privacy of the users, whose moves are so meticulously recorded, would be keenly observed at eBay, whose good name in the Internet community is one of its prime assets. But in the U.S. of the post 9/11 and pre-Gulf War II era, helping the "security forces" is considered a supreme act of patriotism.
 
Who needs a subpoena?
 
"We don't make you show a subpoena, except in exceptional cases," Sullivan told his listeners. "When someone uses our site and clicks on the `I Agree' button, it is as if he agrees to let us submit all of his data to the legal authorities. Which means that if you are a law-enforcement officer, all you have to do is send us a fax with a request for information, and ask about the person behind the seller's identity number, and we will provide you with his name, address, sales history and other details - all without having to produce a court order. We want law enforcement people to spend time on our site," he adds. He says he receives about 200 such requests a month, most of them unofficial requests in the form of an email or fax.
 
The meaning is clear. One fax to eBay from a lawman - police investigator, NSA, FBI or CIA employee, National Park ranger - and eBay sends back the user's full name, email address, home address, mailing address, home telephone number, name of company where seller is employed and user nickname. What's more, eBay will send the history of items he has browsed, feedbacks received, bids he has made, prices he has paid, and even messages sent in the site's various discussion groups.
 
Attorney Nimrod Kozlovski, author of "The Computer and the Legal Process" (in Hebrew), heard the lecture, and could not believe his ears. "The consent given in the user contract should be seen as `coerced consent,' in the absence of any opportunity to exercise free choice, with no real alternative but to agree. This is most certainly not conscious consent."
 
Kozlovski is part of the Information Society Project group at Yale Law School, in which he and his colleagues consider the effects of the new media on the structure of society. American law does not authorize searches of a person's home or body, he says, except in exceptional cases such as when the court authorizes a search, or when the individual gives his consent to a search.
 
"In the case before us, the Web site signs the user to a document that says it can do whatever it wants with his information. The eBay contract signed by the user concedes his or her rights to protection from the government; in essence, as soon as the contract is signed, eBay can invite the government to do whatever it wants with the information, he says.
 
A brief visit to the company's Web site reveals that the "user contract" that visitors are supposed to read before agreeing to the conditions is 4,023 words long. One paragraph makes reference to the site's "privacy policy." The user has to click on a link and is diverted to another document that is some 3,750 words long. It then takes another 2,390 words to reach the section about which Sullivan told the legal authorities: The user's privacy is solely up to eBay.
 
"The users are asked to read and agree to the site policy before they can make use of it," eBay spokesman Kevin Pursglove told Haaretz. "We provide a link to our privacy policy on every single page of our site, and provide summaries of this policy, all so that users will be familiar with our policy."
 
We will work for you
 
Nevertheless, eBay does not make do with simply sharing its data with the legal authorities. Sullivan says the company employs six investigators, all of whom have experience in police investigations. Their job is "to track down suspicious people and suspicious behavior." To that end, they scan for patterns that are atypical - different from "normal patterns." For example, if a person sold baseball tickets for two months and suddenly switches to selling a car, the eBay system will "wave a red flag" and signal the seller as someone behaving unusually. Who asks eBay to do it? No one. eBay volunteers.
 
eBay goes even further. In his lecture, Sullivan spoke about how he helped investigators locate a user who had been suspected of selling stolen cars through the site. "We tried to buy the car from the thief and in that way incriminate him. But the bad guy was smart. He saw there wasn't a single feedback in the history of the person who was making the purchase. He told us he didn't want to make a deal with us."
 
Sullivan explained that the incident taught the company a lesson, and that since then it has used pseudo buyers for which it constructs comprehensive simulated histories, including simulated feedbacks, all for the sake of incriminating those suspected of theft. "eBay is not willing to tolerate acts of fraud carried out on its site," explains Pursglove. "We believe that one of the ways to fight fraud is to cooperate with the legal authorities at the various levels.
 
Sullivan is even more forthcoming. Aware of how hard the police work, he decided to help as much as possible. "Tell us what you want to ask the bad guys. We'll send them a form, signed by us, and ask them your questions. We will send their answers directly to your e-mail." Essentially, by engaging in what seems like impersonation, eBay is exploiting its relationship with customers to pass on information to law enforcement authorities. Why? "We take various steps in order to fight fraud and provide a safe buying environment for our numerous users," says Pursglove.
 
"In order to prevent misuse of authority, the law ensures that authorized impersonation will only be used with persons suspected of carrying out illegal activity," says Pursglove. But eBay's practice is to impersonate people on a regular basis, for law-enforcement objectives. However, "there need not be a proven connection or well-founded suspicion of a crime having been performed," claims Kozlovski.
 
In July 2002, eBay bought PayPal, Inc. for $1.45 billion. PayPal, which offers the most popular means of payment on eBay, provides clearing services for the execution of online transactions. It enables Internet users to open accounts on the company site, transferring money from their credit card or bank account. When carrying out a transaction, the seller receives a certificate with which money can be withdrawn from the buyer's account in cash. The system obviates the need to reveal personal financial data.
 
When Paypal was acquired, the company reported 16 million users, as well as 3 million business accounts and 28,000 new visitors to the site each day. About 60 percent of PayPal's income derives from commissions received from users buying goods on eBay. About 70 percent of eBay buyers use PayPal.
 
Two years earlier, eBay bought Half.com, a site that specializes in sales of CDs and books. Sullivan explained that these acquisitions help eBay to provide lawmen with a full picture. "Every book or CD comes with a bar code. So we know who bought what. The acquisition of PayPal helps us to locate people more precisely. In the old days, we had to trace IP addresses (unique address given to computers linked to the Internet), to locate the buyer, but now Paypal supplies us with the money trail.
 
PayPal has about 20 million customers, which means that we have 20 millions files on its users," Sullivan proudly relates. "If you contact me, I will hook you up with the Paypal people. They will help you get the information you're looking for," he tells his listeners. "In order to give you details about credit card transactions, I have to see a court order. I suggest that you get one, if that's what you're looking for." It isn't certain that visitors to the site are aware of the thick hints eBay gives the lawmen.
 
"By buying PayPal, eBay is merging the information about the goods trail with the money trail," explains Kozlovski. "Thus, in spite of the protective mechanisms of the law against disclosure of details on transactions, eBay is in a position to analyze the full set of data and `advise' investigators when it might be `worthwhile' for them to ask for a subpoena to disclose the details of a financial transaction. Essentially, this bypasses the rules on non-disclosure of details of financial transactions and the confidentiality of the banker-client relationship."
 
Kozlovski mentions how special investigator Kenneth Starr issued a court order that ordered the bookstore where Monica Lewinsky bought her books to report to him the names of the books she bought. "Then, there was a huge fuss. Now you don't need a special order - eBay does the work for the investigators."
 
Kozlovski feels that eBay's practice should be seen as part of a worrisome trend in the West to curtail protection of individual rights. In communist regimes, he says, the state would assign watchers to follow every citizen, who would pass incriminating information on to the authorities. Now the state doesn't have to do a thing. People come to it of their own free will. This is also the case for eBay, which exploits its stature in the market to have users accept contracts that strip them of their privacy. Perhaps the regime is different, but the outcome is most assuredly the same.
 
A million new items a day
 
eBay has no operations in Israel. But in the U.S., Europe and even the Far East, the name eBay is uttered in the same breath with names like Yahoo, Google and Amazon. The company created an electronic business arena where sellers offer their wares and buyers purchase them. eBay's trick is that both the sellers and the buyers are ordinary citizens. On eBay, you can find people selling used chewing gum (and there are buyers), torn soccer balls, 18th century forks, sunflower seeds and luxury cars (in 2002 alone, some 3,000 cars were sold on the site, at a total of $30 million.)
 
eBay is one of the few Internet companies that shows huge profits quarter after quarter. The company completed the fourth quarter of 2002 with revenues of $414 million and net profits of $87 million. The company had overall income in 2002 of $1.2 billion, and net profits of $250 million. It is traded on Nasdaq at a company value of $23.4 billion - three times that of Amazon, twice that of Yahoo and eight times that of the Israeli security behemoth, Checkpoint.
 
At any given moment, eBay is conducting some 12 million auctions, divided into about 18,000 different categories. About two million new items are offered for sale every day, and 62 million registered users scour the site to find them. These users have given eBay the monopoly on online auctions in America. Companies such as Yahoo and Amazon tried to get into the auction market, but were forced to give up. An estimated 150,000 people earn their livelihoods solely from buying and selling items by Internet. The company maintains local sites in Britain, Germany, Italy, South Korea, Ireland, Australia, Spain, Singapore and Sweden.
 
eBay is a monster that churns out money 24 hours a day, 365 days a year - for itself and for its millions of users.
 
© Copyright 2003 Haaretz. All rights reserved
 
http://www.haaretz.com/hasen/pages/ShArt.jhtml?itemNo=264863&contrassID=2&subContrassID
=5&sbSubContrassID=0&listSrc=Y&itemNo=264863

 

In the Name of Jesus Christ the Lord, amen

The Last Deception

Section 2

  section 3   

section 4 

  section 5  

section 6  

section 7 

  section 8 

section  9     

section 10  

section 11  

section 12  

section 13 

section 14 "The Protocols of the Illuminated Elders of Tzion"

  section 15 

      section 16 "The Beast Has Risen" 

 section 16-B

 section 17  

  section 17-B  

  section 17-C   

section 17-D

  section 18    

section 18-B

section 19    

section 19-B

section 20  

 section 20-B 

  section 20-C 

  section 20-D 

  section 20-E

section 21 

  section 22  

section 23

section 24

section 25

Daniel's Seventy Weeks

Was Peter a Jew?

The Two Witnesses

"The Whore of Babylon"

Mystery Babylon

 Are the " Ael-ians coming"

Ael-ians II

Wall Street " The Mark" is Here

Wall Street II

Wall Street III

It has happened "War Declared upon and in America"

Declared section Part II

"Questions"

"All you ever need to know about their god and Qabalah"

Qabalah Part II

Qabalah Part III

National Identification Card

Prophecy Unfolding

A Sincere Request to  "Rapture" Teachers

"Seventh Trumpet"

Compulsory Constitutional Cremation

Homeland Security, "The Police State"

"The Fourth Beast"

The Babylonian Talmudic Mystical Qabalah

The Scribes of Baal

How will they do it- " The false-christ"

False Christ Part II

The Word

Baal's food Tax

"The Changing of the Guards"

"Summation" The beginning of sorrows has begun

"Moshiach ben Lucifer"

Satan's Tales "Wagging the Global Dog"

"Satan's Plan", Protocols of Zion ( of course they will dispute it's authenticity)

I Witch, New One World Order Seal

Satan's Enforcers of Quaballah

Satan's Enforcers Part 2

Satan's Enforcers Part 3

Satan's Enforcers Part 4

The Seed of God or the Seed of Satan, Your choice by faith

Pledge of Allegiance Part Two

I AM, the Revelation of Jesus Christ

King of the Noachides

"Beware the Mark"

"Beware the Mark" part two

"Beware the Mark" Part 3

"Beware the Mark" Part Four

"Beware the Mark" Part Five

 Harvest of Fear

"Harvest of Fear" Part Two

"Harvest of Fear" Part Three

National Organization Against Hasidic International Talmudic Enforcement

Where's Da Plane Boss, wheres da plane?

The Tarot Card Killer of Olam Ha Ba

The "Lessor Jew"

Temporary Coup d' Etat

The Federal Reserve, Fed up with the Fed?

The Protocols Today. Dispute this, Liars !

Protocols Today Part Two

Letter to a friend "It's not the Jews Dummy"

Identity of the Illuminati

The "Son's of the Synagogue of Satan"Chabad Lubavitch

Chabad Satan Part 1A

Chabad Satan Part 2

Chabad Satan Part 2A

Chabad Satan Part 2B

Chabad Satan Part 3

Chabad Satan Part 3A

Chabad Satan Part 4

Chabad Satan Part 4A

Chabad Satan Part 4B

Chabad Satan Part 4C

Chabad Satan Part 5

Chabad satan Part 5A

Chabad Satan Part 5B

Chabad Satan Part 5C

Chabad Satan Part 6

Chabad Satan Part 6B

Chabad Satan Part 6C

Chabad Satan Part 6D

Chabad Satan Part 7

Chabad Satan Part 7A

Chabad Satan Part 7B

Chabad Satan Part 7C

Chabad Satan Part 8

Chabad Satan Part 8A

Chabad Satan Part 8B

Chabad Satan Part 8C

Chabad Satan Part 8D

Chabad Satan Part 9

Chabad Satan Part 9A

Chabad Satan Part 9B

Chabad Satan Part 9C

Chabad Satan Part 9D

Chabad Satan Part 10

Chabad Satan Part 10A

Chabad Satan Part 10B

Chabad Satan Part 10C

Chabad Satan Part 10D

The Chabad Satan Wall of Destruction

Chabad Wall Part 2

Chabad Wall Part 3

Chabad Wall Part 4

The Chabad Phoenix is Rising

Columbia "The Queen of Heaven"

Patriot Akt II, Comrad 

The Infiltration of the leaven "Jerusalem Council"

Satan's One World Religion

OWR Part 2

OWR Part 3

OWR Part 4

One World Religion Part 5

One World Religion Part 6

One World Religion Part 7  

Re the god of Talmud Bavli

Perpetual Purim

"The Raiser of Taxes"

Jewish Persecution

Obedient Ishmael Kislev 19, 5764

The Final Nazi

Nazi Part 2

Nazi Part 3

Nazi Part 4

The Lord of the Ring, the Return of the Talmudic king

Changing the Time and the Laws

anti-semitism?

Who murdered Jesus the Christ

"Replacement Theology" of Judaic Talmudism

Eating Rainbow Stew with a Silver Spoon, underneath a Noahide Sky

the gods

"The Two Whores"

Noahide News

Noahide News 2

infosam@bellsouth.net