Surveillance is in these days. Total Info. Total Watchdog. Total Control. Welcome to Panopticon World. It's More Than Your County Survey.
How Major Corporations and Government Plan to Track your Every Move
http://www.spychips.com/
Police state USA and Big Brother's most cool tool
By Amy Worthington
03/01/06 "Idaho Observer" -- -- Senate Minority leader Harry Reid (D-NV) calls this Congress the "most corrupt" in history.1 U.S. Representative Ron Paul (R-TX) often uses the term "police state" to describe our national state of affairs. George Bush is making the most expansive claims to unbridled power since America’s War for Independence, according to Senator Patrick Leahy (D-VT).2 Former U.S. Ambassador Joseph Wilson, who proved Bush lied to launch us into war with Iraq, says "fascist forces have seized control of the levers of power."3 Americans are being told that their Republic has become a fascist police state—they just need ears to hear.
In a fascist police state, the dictator secures his power with support from private corporations which are given special privileges and, thus, benefit from doing business with dictators. Continuously bribed by 28,000 corporate lobbyists in D.C.,4 Congress is doing its part to build a fascist state in America.
During President Bush’s recent State of the Union speech, these tainted legislators perpetually rose to their feet to applaud the spewing of what a New York Times editorial called "misleading analogies, propaganda slogans and false choices."5 Their bootlicking recalls a by-gone Soviet era when endless rows of robotic Central Party members applauded the likes of Stalin to ensure their next breath of oxygen.
Passing the fascist laws they never read
After passage of the Patriot Act of 2001, Rep. Paul told Insight Magazine that the 2,200-page bill was not made available to Congress to read before the vote.6 So the most corrupt Congress in history rubber stamped the most fascist legislation they had never read. Our constitution enumerates inalienable rights that are emphatically restated in the first 10 amendments commonly known as "The Bill of Rights." Under the Patriot Act, the "right" to free speech, peaceable assembly and security in one’s person, papers and effects have been relegated to "privileges" that government can take away at any time. Patriot Act authority has suspended the right to due process and a prompt and public trial; it even cancelled protection against cruel and unusual punishment. Agents serving the fascist state can freely wire-tap our phones, enter our homes/offices, search and seize without warrant and detain us indefinitely without charges—ostensibly to keep America safe.
Digital Angel: Fascist Big Brother’s most cool tool
Passive ID subdermal chips are the "good news" compared to grotesque ACTIVE implant chips also developed by ADS. The implantable Digital Angel is a grotesque communication device that can continually relay information wirelessly to either ground stations or to satellite systems.96 Developed to be a true tracking chip like the bulky radio ankle bracelets locked onto prisoners, it is tiny enough to be implanted into human flesh. The Angel has a built-in GPS receiver and a wireless transceiver. In December, 2004, ADS signed an agreement with the satellite telecommunications company ORBCOMM. Such collusion will one day turn implanted citizens into walking radio beacons, trackable by satellite.97
Digital Angel is the ultimate in totalitarian control, to date Big Fascist Brother’s most "cool tool."
http://www.informationclearinghouse.info/article12121.htm
Exception-Based Reporting - Reducing Offender Management Time
Corrections officers have busy schedules and want to spend the most time with offenders that are not complying to the rules. Adding GPS monitoring data to any EM program creates a lot of information for officers to review to verify offender compliance. iSECUREtrac's exception-based monitoring system gives officers reporting tools that reduce the amount of information that must be reviewed to verify an offender's compliance. As an example, most agencies that utilize iSECUREtrac's GPS systems set up parameters in order to receive "pushed" communications of specific offender violations in accordance with each offender's profile, risk factor, and compliance requirements. This may include curfew perimeter management, GPS exclusion zones, GPS inclusion zones, and dozens of other potential compliance requirements. With iSECUREtrac's tracNET24 monitoring software, corrections officers are not only able to set up any number of compliance criteria, but they are able to set up automatic notification criteria that best fits their needs. This dramatically reduces the time required in reviewing information on every offender they are monitoring. Our experience indicates that iSECUREtrac's exception-based reporting system dramatically increases the number of offenders that can be monitored utilizing GPS systems.
Many other systems may offer the ability to set up GPS inclusion zones or exclusion zones, but do NOT integrate automatic notification when GPS zone violations occur, rather only offer notification when curfew or RF proximity violations occur with home base stations. These other systems add more work of reviewing the tracking maps for every offender to verify compliance to their location while under GPS supervision. These other systems limit a correction agencies ability to grow their GPS programs due to the excessive program management time.
iSECUREtrac's fully functional exception-based automated violation notification system eliminates the need for an agency to constantly check or review an offender's whereabouts, but rather allows an officer to receive pertinent violation information and to review location history information on an as-needed basis. Offenders who are in compliance shouldn't require the same amount of personal supervision that non-compliant offenders require. Exception-based reporting enables agency personnel to identify offenders who require higher degrees of supervision and to respond appropriately. Exception-based reporting has made iSECUREtrac's system integral to any agency that wants to best utilize a corrections officer's time in managing his/her offender caseload.
http://www.isecuretrac.com/tn24_p.asp
Watch What You Say
By Tim Shorrock, The Nation. Posted March 9, 2006.
Two months after the New York Times revealed that the Bush Administration ordered the National Security Agency to conduct warrantless surveillance of American citizens, only three corporations--AT&T, Sprint and MCI--have been identified by the media as cooperating. If the reports in the Times and other newspapers are true, these companies have allowed the NSA to intercept thousands of telephone calls, fax messages and e-mails without warrants from a special oversight court established by Congress under the 1978 Foreign Intelligence Surveillance Act (FISA). Some companies, according to the same reports, have given the NSA a direct hookup to their huge databases of communications records. The NSA, using the same supercomputers that analyze foreign communications, sifts through this data for key words and phrases that could indicate communication to or from suspected terrorists or terrorist sympathizers and then tracks those individuals and their ever-widening circle of associates. "This is the US version of Echelon," says Albert Gidari, a prominent telecommunications attorney in Seattle, referring to a massive eavesdropping program run by the NSA and its English-speaking counterparts that created a huge controversy in Europe in the late 1990s.
So far, a handful of Democratic lawmakers--Representative John Conyers, the ranking Democrat on the House Judiciary Committee, and Senators Edward Kennedy and Russell Feingold--have attempted to obtain information from companies involved in the domestic surveillance program. But they've largely been rebuffed. Further details about the highly classified program are likely to emerge as the Electronic Frontier Foundation pursues a lawsuit, filed January 31, against AT&T for violating privacy laws by giving the NSA direct access to its telephone records database and Internet transaction logs. On February 16 a federal judge gave the Bush Administration until March 8 to turn over a list of internal documents related to two other lawsuits, filed by the American Civil Liberties Union and the Electronic Privacy Information Center, seeking an injunction to end the program.
Despite the President's rigorous defense of the program, no company has dared to admit its cooperation publicly. Their reticence is understandable: The Justice Department has launched a criminal investigation of the government officials who leaked the NSA story to the Times, and many constitutional scholars and a few lawmakers believe the program is both illegal and unconstitutional. And the companies may be embarrassed at being caught--particularly AT&T, which spent millions advertising its global services during the Winter Olympics. "It's a huge betrayal of the public trust, and they know it," says Bruce Schneier, the founder and chief technology officer of Counterpane Internet Security, a California consulting firm.
Corporations have been cooperating with the NSA for half a century. What's different now is that they appear to be helping the NSA deploy its awesome computing and data-mining powers inside the United States in direct contravention of US law, which specifically bans the agency from collecting information from US citizens living inside the United States. "They wouldn't touch US persons before unless they had a FISA warrant," says a former national security official who read NSA intercepts as part of his work for the State Department and the Pentagon.
This is happening at a time when both the military and its spy agencies are more dependent on the private sector than ever before, and an increasing number of companies are involved. In the 1970s, when Congress acted to stop domestic spying programs like Operation Shamrock, in which the NSA monitored overseas telegrams and phone calls, the communications industry was in its infancy. "It was basically Western Union for cables, and AT&T for the telephone," says James Bamford, who revealed the existence of the NSA in his famous book The Puzzle Palace and is a plaintiff in the ACLU lawsuit. "It's much more complicated now." In fact, today's global telecom market includes dozens of companies that compete with AT&T, Sprint and MCI for telephone and mobile services, as well as scores of Internet service providers like Google, Yahoo! and AOL that offer e-mail, Internet and voice connections to customers around the world. They are served by multinational conglomerates like Apollo, Flag Atlantic and Global Crossing, which own and operate the global system of undersea fiber-optic cables that link the United States to the rest of the world. Any one of them could be among the companies contacted by intelligence officials when President Bush issued his 2002 executive order to obtain surveillance without FISA approval.
http://www.alternet.org/rights/33334/
Thank You for Waiting. Now Watch What You SAy.
How Major Corporations and Government Plan to Track your Every Move
http://www.spychips.com/
Police state USA and Big Brother's most cool tool
By Amy Worthington
03/01/06 "Idaho Observer" -- -- Senate Minority leader Harry Reid (D-NV) calls this Congress the "most corrupt" in history.1 U.S. Representative Ron Paul (R-TX) often uses the term "police state" to describe our national state of affairs. George Bush is making the most expansive claims to unbridled power since America’s War for Independence, according to Senator Patrick Leahy (D-VT).2 Former U.S. Ambassador Joseph Wilson, who proved Bush lied to launch us into war with Iraq, says "fascist forces have seized control of the levers of power."3 Americans are being told that their Republic has become a fascist police state—they just need ears to hear.
In a fascist police state, the dictator secures his power with support from private corporations which are given special privileges and, thus, benefit from doing business with dictators. Continuously bribed by 28,000 corporate lobbyists in D.C.,4 Congress is doing its part to build a fascist state in America.
During President Bush’s recent State of the Union speech, these tainted legislators perpetually rose to their feet to applaud the spewing of what a New York Times editorial called "misleading analogies, propaganda slogans and false choices."5 Their bootlicking recalls a by-gone Soviet era when endless rows of robotic Central Party members applauded the likes of Stalin to ensure their next breath of oxygen.
Passing the fascist laws they never read
After passage of the Patriot Act of 2001, Rep. Paul told Insight Magazine that the 2,200-page bill was not made available to Congress to read before the vote.6 So the most corrupt Congress in history rubber stamped the most fascist legislation they had never read. Our constitution enumerates inalienable rights that are emphatically restated in the first 10 amendments commonly known as "The Bill of Rights." Under the Patriot Act, the "right" to free speech, peaceable assembly and security in one’s person, papers and effects have been relegated to "privileges" that government can take away at any time. Patriot Act authority has suspended the right to due process and a prompt and public trial; it even cancelled protection against cruel and unusual punishment. Agents serving the fascist state can freely wire-tap our phones, enter our homes/offices, search and seize without warrant and detain us indefinitely without charges—ostensibly to keep America safe.
Digital Angel: Fascist Big Brother’s most cool tool
Passive ID subdermal chips are the "good news" compared to grotesque ACTIVE implant chips also developed by ADS. The implantable Digital Angel is a grotesque communication device that can continually relay information wirelessly to either ground stations or to satellite systems.96 Developed to be a true tracking chip like the bulky radio ankle bracelets locked onto prisoners, it is tiny enough to be implanted into human flesh. The Angel has a built-in GPS receiver and a wireless transceiver. In December, 2004, ADS signed an agreement with the satellite telecommunications company ORBCOMM. Such collusion will one day turn implanted citizens into walking radio beacons, trackable by satellite.97
Digital Angel is the ultimate in totalitarian control, to date Big Fascist Brother’s most "cool tool."
http://www.informationclearinghouse.info/article12121.htm
Exception-Based Reporting - Reducing Offender Management Time
Corrections officers have busy schedules and want to spend the most time with offenders that are not complying to the rules. Adding GPS monitoring data to any EM program creates a lot of information for officers to review to verify offender compliance. iSECUREtrac's exception-based monitoring system gives officers reporting tools that reduce the amount of information that must be reviewed to verify an offender's compliance. As an example, most agencies that utilize iSECUREtrac's GPS systems set up parameters in order to receive "pushed" communications of specific offender violations in accordance with each offender's profile, risk factor, and compliance requirements. This may include curfew perimeter management, GPS exclusion zones, GPS inclusion zones, and dozens of other potential compliance requirements. With iSECUREtrac's tracNET24 monitoring software, corrections officers are not only able to set up any number of compliance criteria, but they are able to set up automatic notification criteria that best fits their needs. This dramatically reduces the time required in reviewing information on every offender they are monitoring. Our experience indicates that iSECUREtrac's exception-based reporting system dramatically increases the number of offenders that can be monitored utilizing GPS systems.
Many other systems may offer the ability to set up GPS inclusion zones or exclusion zones, but do NOT integrate automatic notification when GPS zone violations occur, rather only offer notification when curfew or RF proximity violations occur with home base stations. These other systems add more work of reviewing the tracking maps for every offender to verify compliance to their location while under GPS supervision. These other systems limit a correction agencies ability to grow their GPS programs due to the excessive program management time.
iSECUREtrac's fully functional exception-based automated violation notification system eliminates the need for an agency to constantly check or review an offender's whereabouts, but rather allows an officer to receive pertinent violation information and to review location history information on an as-needed basis. Offenders who are in compliance shouldn't require the same amount of personal supervision that non-compliant offenders require. Exception-based reporting enables agency personnel to identify offenders who require higher degrees of supervision and to respond appropriately. Exception-based reporting has made iSECUREtrac's system integral to any agency that wants to best utilize a corrections officer's time in managing his/her offender caseload.
http://www.isecuretrac.com/tn24_p.asp
Watch What You Say
By Tim Shorrock, The Nation. Posted March 9, 2006.
Two months after the New York Times revealed that the Bush Administration ordered the National Security Agency to conduct warrantless surveillance of American citizens, only three corporations--AT&T, Sprint and MCI--have been identified by the media as cooperating. If the reports in the Times and other newspapers are true, these companies have allowed the NSA to intercept thousands of telephone calls, fax messages and e-mails without warrants from a special oversight court established by Congress under the 1978 Foreign Intelligence Surveillance Act (FISA). Some companies, according to the same reports, have given the NSA a direct hookup to their huge databases of communications records. The NSA, using the same supercomputers that analyze foreign communications, sifts through this data for key words and phrases that could indicate communication to or from suspected terrorists or terrorist sympathizers and then tracks those individuals and their ever-widening circle of associates. "This is the US version of Echelon," says Albert Gidari, a prominent telecommunications attorney in Seattle, referring to a massive eavesdropping program run by the NSA and its English-speaking counterparts that created a huge controversy in Europe in the late 1990s.
So far, a handful of Democratic lawmakers--Representative John Conyers, the ranking Democrat on the House Judiciary Committee, and Senators Edward Kennedy and Russell Feingold--have attempted to obtain information from companies involved in the domestic surveillance program. But they've largely been rebuffed. Further details about the highly classified program are likely to emerge as the Electronic Frontier Foundation pursues a lawsuit, filed January 31, against AT&T for violating privacy laws by giving the NSA direct access to its telephone records database and Internet transaction logs. On February 16 a federal judge gave the Bush Administration until March 8 to turn over a list of internal documents related to two other lawsuits, filed by the American Civil Liberties Union and the Electronic Privacy Information Center, seeking an injunction to end the program.
Despite the President's rigorous defense of the program, no company has dared to admit its cooperation publicly. Their reticence is understandable: The Justice Department has launched a criminal investigation of the government officials who leaked the NSA story to the Times, and many constitutional scholars and a few lawmakers believe the program is both illegal and unconstitutional. And the companies may be embarrassed at being caught--particularly AT&T, which spent millions advertising its global services during the Winter Olympics. "It's a huge betrayal of the public trust, and they know it," says Bruce Schneier, the founder and chief technology officer of Counterpane Internet Security, a California consulting firm.
Corporations have been cooperating with the NSA for half a century. What's different now is that they appear to be helping the NSA deploy its awesome computing and data-mining powers inside the United States in direct contravention of US law, which specifically bans the agency from collecting information from US citizens living inside the United States. "They wouldn't touch US persons before unless they had a FISA warrant," says a former national security official who read NSA intercepts as part of his work for the State Department and the Pentagon.
This is happening at a time when both the military and its spy agencies are more dependent on the private sector than ever before, and an increasing number of companies are involved. In the 1970s, when Congress acted to stop domestic spying programs like Operation Shamrock, in which the NSA monitored overseas telegrams and phone calls, the communications industry was in its infancy. "It was basically Western Union for cables, and AT&T for the telephone," says James Bamford, who revealed the existence of the NSA in his famous book The Puzzle Palace and is a plaintiff in the ACLU lawsuit. "It's much more complicated now." In fact, today's global telecom market includes dozens of companies that compete with AT&T, Sprint and MCI for telephone and mobile services, as well as scores of Internet service providers like Google, Yahoo! and AOL that offer e-mail, Internet and voice connections to customers around the world. They are served by multinational conglomerates like Apollo, Flag Atlantic and Global Crossing, which own and operate the global system of undersea fiber-optic cables that link the United States to the rest of the world. Any one of them could be among the companies contacted by intelligence officials when President Bush issued his 2002 executive order to obtain surveillance without FISA approval.
http://www.alternet.org/rights/33334/
Thank You for Waiting. Now Watch What You SAy.

0 Comments:
Post a Comment
<< Home