Live Free or Die Hard IV: Agility driven Supply Chain Eugenics Economy Exposed

Author Topic: Live Free or Die Hard IV: Agility driven Supply Chain Eugenics Economy Exposed  (Read 22965 times)

0 Members and 1 Guest are viewing this topic.

Anti_Illuminati

  • Guest




"If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of."

“The globalization of the world economy will also continue, with a widening between “haves” and “have-nots.”

http://www.middlepowers.org/gsi/docs/vision_2020.pdf
http://www.fas.org/spp/military/docops/usspac/lrp/toc.htm

http://www.youtube.com/watch?v=on3WKwWJJPI
http://www.youtube.com/watch?v=TXIVoKrn9uQ



12/04/07  Vicky Davis

Vicky Davis (12/04/07), former systems analyst who lost her job in the 1990’s when so many of the “knowledge jobs” were outsourced to India. Her website, www.channelingreality.com, consists of four main topics: The Silent War, New Federalism, The Coup d-Etat, and Shock and Awe.  

Silent War: Privatized government is conducting low-intensity conflict (i.e., terrorism) against the people of the U.S.  It is an information war and a form of cultural warfare.  

The New Federalism: The Clinton administration re-invented government, passing framework legislation, based on implementation and funding by NGO’s (non-governmental  organizations- note: This violates constitution).  For example, the Smart Growth Network, funded by the EPA, got grants from federal agencies and private entities.  Agenda 21 (UN Agenda for the Twenty-First Century) was a coup d’etat in which government functions were contracted out to private corporations.  The new government structures amount to a “market-based government.”  Check report by William Perry, Ashton Carter, and Phillip Zelikow, entitled “Catastrophic Terrorism- Elements of a National Preventative Policy.”  In 1991/1992, under Bush senior, Douglas Noble and a committee of corporations wrote “New American Schools for the New World Order.”   The board of the “New American Schools Development Corporation” includes James Jones, James Baker, John Clendenon, and Louis Gerschner (CEO of IBM).

Agenda 21. under the banner of “smart growth” (thank you, George Orwell) and environmentalism, calls for re-wilding huge sections of the U.S.  It tries to establish special places, called World Heritage Sites.  President Clinton’s “Council on Sustainable Development” mandated that city mayors had to be engaged in “sustainable development.”  He set up “Conference of Mayors,” an international conference in Paris.  Participants included the Aspen Institute of France and the Aspen Institute of Berlin.   This was followed by “Transatlantic Summit of Mayors” in 2000.

The Coup d”Etat: The 9/11-NAU (North American Union) connection is the establishment of the Free Trade Agreement of the Americas (FTAA).  Colin Powell signed the Inter-American Democratic Charter on 9/11/2001.  This is intended to be the Magna Carta of the Americas.  In the early 1990’s, Sandy Berger, working for Anthony Lake (Department of National Security) set up the merger of all governments of all countries in the western hemisphere.  Goal was to have four summits, set direction of working groups with representatives of each country to “harmonize” the laws and coordinate the policies of the future “Pan-American Union.”  (By the way, all this is highly treasonous to the U.S. Constitution and to the American people).  However, when John Deutch left the CIA, Lake couldn’t be confirmed, and George Tenet was selected to be CIA director.  At the time, Tenet was lobbying for the Solar Industry.  Senator David Boren then selected him to be his Chief of Staff, where he worked on CIA issues.  As CIA director, all Tenet did was establish a paper trail on “Osama the boogie man” (the designated patsy of 9/11 and other government-sponsored synthetic terrorism acts).  Check out the movie: Invasion of the Body Snatchers.  BORSTOR.  The Plan, the Code name for Operation 9/11 was “The Big Wedding,” because it was supposed to be catalyst for merger of all western hemisphere countries.  

As a systems analyst, Vicky Davis was trained to look for the conceptual thinking behind the words, using the Yourdan Method, that helps you identify major processes, organize information and create indices and a hierarchy of concepts.  Total Information Awareness- the computer system- springs from DARPA- of the Dept. of Defense.

The NAFTA corridors are planned to be smart corridors, totally automated, with remote sensors so that they can ID the people in cars.  They will be designed to toll you by the mile using surveillance software of total domain awareness.  GIS (Geographic Information Systems), P-tech and Promis software technology will be used to establish command and control centers.

The New Federalism: Book report, “The Blair House Papers,” by Clinton and Gore, indicates that the era of big government is over.  Now, government is “privatized” through contracting out government functions to private corporations.  Al Gore headed up the FTAA and re-invention of government.  The new American way of war will be to use Command and Control Centers.  Thomas Barrett, professor at the R.I. Military College, drew up the Pentagon’s New Map.  He is father of net-centered warfare- 21st century military force.  The old model is no longer needed.  Art Sobrosky, author of The New American Way of War  has website.  Now military will utilize “effects-based operations” (i.e., terrorism), using small teams like Al Qaeda (aka Al CIA-duh), working groups (teams of government workers from the U.S., Canada and private sector, etc.), and think tanks (to write policy papers, etc.).   The Report from Iron Mountain was written by the Rand Corporation and IBM.  


09/23/08  Vicky Davis  
 

          Vicky Davis, who maintains the www.channelingreality.com website, was a contract Computer Systems Analyst/Programmer.  After the year 2000, she could no longer find contracts for her skills, even though she had 20 years of solid and successful years of experience.  Vicky believes the loss of her career is the result of the Knowledge Trade Initiative, which deliberately outsourced many, many American knowledge jobs... primarily to India.


9/11 as a computer crime?

Davis stated that on the morning of 9/11 there was denial of service to the risk management system designed to block such attacks.  I didn’t say that (although I’ve read it)  - what I said was that the emergency open communications line between the FAA and NMCC went dead - neither party was aware of it and it is my belief that the PTECH software was used to shut it down.

A key piece of software used on 9/11 was owned by the company PTECH.  PTECH has connections to the PROMIS software, which was written for the Justice Department by Bill Hamilton of Inslaw.  PROMIS allowed operators to traverse justice department systems to obtain information on cases including investigations and assets listed in bankruptcies.  The only way this could have been done is if the software had a “back door” through the IBM hardware controller.  “This is arcane knowledge,” and only a highly trained IBM technical support person could have devised it.  The Justice Department under Attorney General Edwin Meese confiscated the software and wouldn’t pay Hamilton, inventor of the software.  Hamilton sued and after years of litigation, they were rescued by IBM, when Inslaw was about to go under.   Rescue by IBM meant that IBM then owned the PROMIS software.

Indira Singh, Consulting Systems Analyst to J.P. Morgan for Morgan’s Risk Management systems on 9/11, has maintained that Arab’s were trying to sell PTECH software to the J.P. Morgan bank.  But, because of inconsistencies (to a fellow Systems Analyst) in Singh’s testimony, Vicky believes this may be just a cover story.  IBM marketed PTECH “Framework” software that produces tables and lists of all resources on the computer.  It provided a ‘window on the world’ into the computer system.  The “back door” capability of PROMIS built into the PTECH software was a way to get into the bank’s software by stealth, without at user ID or password.   This corresponds to the Congressional investigation of the Inslaw software in the 1990’s.

A 1992 Congressional investigation included allegations that the FBI was being subverted.  When FBI agents wanted  to execute a raid, they would find that evidence would be gone.  Apparently, criminals were being informed ahead of time that they were being investigated.   The implication is that the PROMIS software had the backdoor and that back door was being exploited to warn off criminals that they were being investigated.  Noteworthy - the CEO of IBM in the 1990’s, Louis Gerstner, Jr., later became CEO of the Carlyle Group.

Vicky began her career in 1976 in Silicon Valley and based on her experience there, she thinks she knows how the PTECH “back door” might have worked.  One company Vicky interviewed with wrote software for a warehouse system involving fork lifts and wireless communication.  This wireless communication allowed the forklift operator to update the computer inside the warehouse even while he was driving the forklift.  If a similar (very low tech) strategy was used on 9/11, this “Trojan Horse,” could have been simply a chip on a circuit board.  All they would need to do is record the first 25 characters and they could hack into any corporate and government computer system. Using a keystroke recorder burned into the extra chip along with passive communications software that would upload the characters on demand, the hacker could obtain the User ID and Password of any User on the system.

INSERT:  This is in fact true, and is confirmed here:  Michael Riconosciuto on Encryption  http://forum.prisonplanet.com/index.php?topic=102936.msg615593#msg615593  

If that’s the way they did it, it would have been the perfect crime.  One person could have shutdown the line connecting the FAA and NMCC (National Military Command and Control).  “Coincidentally,” the person manning the NMCC on the morning of 9/11 was a first day employee and his boss was away at a meeting.  So, the new man on the job didn’t even know that on the morning of 9/11 the communication between FCC and NMCC was down.

Vicky believes that a coordinated sequence of events lead to PTECH and 9/11.  At the G-8 meeting in Houston in 1999 and at the 2000 United Nations meeting in Okinawa, Japan, there was considerable talk about bridging the “digital divide,” that is, the gap between developed and undeveloped countries.  The Plan of Action presented in Genoa was for governments and NGO’s (non-governmental organizations) to bring the internet to under—developed countries.  The partnership team to help implement this included MARKLE, headed by Zoe Baird, Anderson Consulting Company, the Chubb Corporation, and AIG.   The idea was to export our knowledge jobs (bio-tech, computer, etc.) to India.  At that time, the US economy was 65% dependent on the knowledge industry.  On Nov. 9, 2001, President Bush signed the Knowledge Trade Initiative which was a torpedo to our economy.

 
New Federalism  

Under Clinton and Gore’s “re-inventing government”  program, they implemented what has been termed ‘New Federalism’ which is essentially the privatization of government.  Congress passes framework legislation and funding; but the programs are implemented by a partnership of Foundations and Non-Governmental organizations - funded by corporations.  This leaves in place the façade of a federal government, but it is actually closer to the German model of socialism (ref. Ludwig Von Mises).

The Harvard paper written by Phillip Zelikow and Ashton Carter lays this out: “Catastrophic Terrorism, a National Policy” includes a reference to “market-based governance.”   'New Federalism is market-based 'governance.  There is a video on Newt Gingrich’s Americansolutions.org website where Elaine Kamarck, PhD. describes market-based governance in a presentation titled, “End of Government As We Know it” .  Clinton’s ‘New Federalism’ was the end of constitutional government and the beginning of the communist system of “governance by soviets” with soviet being defined as councils or committees.

The soviet system corresponds to the idea of “virtual government,” where all policies come from a central source.  The policies come from the EU and UN in Geneva (or where ever), and then are implemented by NGO’s.  But in this “virtual government,” there is no representation for people.  The most active part of the United Nations is UNESCO.  Their sustainable development groups are charged with  implementing U.N. environmental policies.  Under the heading of accountability, they have to tag and inventory everything because remote “governance” requires computerized monitoring of the performance of the soviets and the level of cooperation of the people.

The World Bank plan is to measure our productivity relative to the resources we consume.   If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of.  This idea is codified in the U.N. term, “family dependency ratio,” which refers to this kind of analysis being applied to an entire family.

These ideas are kind of implicit in what they write about their “poverty reduction strategies.”  The strategy is that under-developed countries would get development dollars if they reduce poverty.  To even get the development dollars, then, third world leaders more or less have to eliminate the poor.   The “poverty reduction” campaigns are eliminating poor people in Africa.  Indeed, much of the modern environmental movement traces back to the eugenics movement.  The definition of the environment as “everything we touch and everything that touches us” justifies the totalitarian control of everything under the heading of efficient utilization of resources.  This corresponds to the The Report from Iron Mountain, written by the Rand Corporation concerning population reduction.  It is Vicky’s belief that this report is real and that it served to provide the plan to the various players. Indeed, our government is fomenting revolution in a lot of countries.  

 
Turnkey Democracy and Revolution

The National Endowment for Democracy (NED) is a granting agency funded by the U.S. government that provides grants for organizations representing business, labor, the International Republican Institute, and National Democratic Institute.  NED provides “turn-key democracy”  through the soviet system of NGO’s.  NED has been linked to the “Color Revolutions” that are now going on all over the world.

 
Control of Resources by Supply Chain

Our transportation system and transportation systems all over the world are being redesigned to facilitate “supply chain management.”  The monopoly cartels will control all supplies through supply chain management.  For example, Dell Computers have lots of components.  Each component generates orders and each of these generates lots of smaller orders.  The idea is that if you want to stay in business, you control all aspects of the supply chain, thereby putting everyone else out of business.

Thus, we have to break up the monopolies.  It seems that Sec. of Treasury Paulson and Fed Reserve Chairman Bernanke want to set up an E-Bay style auction to handle the junk assets.  Only in this reverse auction, the government rewards the lowest bidder.  This is essentially D-Day for the capitalistic system and it gives Secretary Paulson unprecedented control over the economy and the system.  It also sets up a new market mechanism.  It is not a bail out, per se.  All these pieces of legislation have U.N. Agendas embedded in them.   If you control the supplies - you control country.

If this evil program is implemented, the UN system of “governance by soviets” will have complete control- forever.  The concept of “virtual governance” by computer system includes a national health care system.  The nationalization of medical records and outcome performance measuring provides the capability for human experimentation and potentially genetic modification- of people.  What scares Vicky, is that they could create a population of drones, like an ant colony, using genetic modification.

Essentially 9/11 was part of a Mind War experiment- to see how the population would react when you couple emotional shock with absurd explanations.

At first, all government revenues were from tariffs.  Then in 1913, tariffs were cut in half, with the remaining being paid by American citizens and business.  This has resulted in the indenture of the American people.  Now our labor is collateral to the bankers.  Americans need to awaken and snap out of their dream-sleep.












Anti_Illuminati

  • Guest

Anti_Illuminati

  • Guest

Offline IridiumKEPfactor

  • Member
  • *****
  • Posts: 3,668
"If the ratio of our productivity to consumption is over 1 that’s OK, but if not, you are a “useless eater,” and perhaps need to be disposed of."

Or simply put.    "Then I heard what sounded like a voice among the four living creatures, saying, "A quart of wheat for a day's wages....

I understand that system and it is total control. Absolutely a great find.

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 17,733
"Smart and Secure Trade Corridor" isn't that right out of the SPP? and the Trans-Texas Corridor?

http://www.cfr.org/publication.html?id=5442
Constructing a Secure Trade Corridor
Author:  Stephen E. Flynn
March 11, 2002 Foreign Affairs

A paper by
Dr. Stephen E. Flynn
Senior Fellow, National Security Studies Council on Foreign Relations

sflynn@cfr.org
Presented to:
The Ports of Los Angeles and Long Beach,
The Marine Exchange of Los Angeles and Long Beach,
U.S. Coast Guard, U.S. Customs Service, and U.S. Immigration Service
...
THE “OPERATION SAFE COMMERCE” PROTOTYPE
The goal of the Operation Safe Commerce prototype is to involve, as partners, companies that routinely move time-sensitive goods originating from overseas and using a megaport such as Rotterdam or Singapore as a port of transshipment and arriving in the United States in the northeast and southern California. The aim is to develop incrementally, in a layered, multi-tiered approach, to include several international supply chains.

OPERATION SAFE COMMERCE BETA PROJECT:
In order to identify, test, adopt and refine Safe Commerce Standards, the beta project will start with two international supply chains— one originating in the Europe and the other in Asia— and:

Form a West Coast and East Coast regional task force, with the explicit endorsement of the Office of Homeland Security, that includes border control agents and other relevant security, law enforcement, and regulatory authorities. These groups should also enlist the support of appropriate academic and technical experts.

Task the regional task force members to examine for security gaps: (1) the entire design-to-delivery product flow; and (2) the means of conveyance – maritime, rail, truck, and air; and (3) the “who and how” connected with the operators who move the products.

Have the regional task force prepare recommendations they believe might redress the gaps they identify. These recommendations should fall under three groupings: (1) off-the-shelf technologies for securing and tracking shipments, (2) improvements to existing data-collection and sharing arrangements, and (3) process changes that would close opportunities for compromise at the point of origin or in transit.

Conduct a trial of new technologies, data arrangements, or process changes using volunteer manufacturers, importers, surface shippers, freight forwarders, maritime shipping lines, and terminal operators.
...
CONCLUSION
Demonstrating a prototype that features point of origin and supply chain controls, the use of new technologies, and bilateral and multinational cooperation promises to enhance the ability of securing our international trade corridors in the face of a heightened terrorist threat. This approach precludes the need to disrupt trade moving through the U.S. seaports, or at U.S land-border crossings, and thus adverts all the subsequent adverse economic consequences for United States and global trade. In the end, developing a model for constructing a secure trade corridor is about sustaining the vital national security imperative of to preserve an open and secure system for global trade and travel upon which the economic basis of American prosperity and power ultimately rests.

http://www.canamex.org/PDF/CANAMEX_CorridorOverview_021407.pdf

CANAMEX Corridor (S3: Safe, Smart and Secure) Overview

Overview
The CANAMEX Corridor is a nationally designated high priority route traversing the states of Arizona, Nevada, Utah, Idaho and Montana, linking to the Canadian Province of Alberta and the Mexican States of Sonora, Sinaloa, Nayarit and Jalisco.
Organizationally the development of the Corridor is advanced through a multi-state coalition including public and private sector representatives selected by the Governors of the five states. The Governor of Arizona designates a Taskforce representing state directors, and community and business leaders.
The intention is to strategically invest in infrastructure and technology to advance a focused agenda to increase competitiveness in global trade, create jobs and maximize economic potential within the five state region.

Notable accomplishments include
1) $2.1 M CyberPort allocation for the construction of the Mariposa Port of Entry FAST lanes;
2) $300,000 for the a GSA Mariposa Port of Entry Redesign Feasibility Study;
3) Completion of the Wi-Fi Security Project for First Responders;
4) Mexican federal designation of the Guaymas -Arizona Multi-modal Corridor and
5) High Priority Visibility of the CyberPort initiative, Ag Seal and Secure, to expedite the movement of Mexican Winter Produce.

Priorities Arizona Task Force, Multi-State Coalition and International Partnerships
Arizona Priorities: Marine Ports; Telecommunication; Infrastructure and CyberPort

· Develop in conjunction with identified stakeholders a strategy to position Arizona to capitalize on new marine port
development plans and existing trade from LA/Long Beach.
· Collaborate with Sonora and Mexico’s Secretary of Transportation and Communication to incorporate the results of the
Guaymas to Tucson Corridor Study into a realistic approach for multi-modal corridor growth.
· Advance the recommendations of the Governor’s Council on Innovation and Technology for Telecommunication
infrastructure and Broadband development, specifically to ensure broadband access for communities with a population of
500 and above and cellular service along every mile of the interstate and major highway system
.
· Evaluate how the WiFi Security Project for First Responders should be used as the bases for a corridor-wide pilot.
· Implement a Seal and Secure Pilot in Mexico that expedites movement of low risk produce shipments to the Mariposa
Port of Entry in Nogales, Arizona.

· Identify resources for a proposal to secure domestic and foreign agriculture producer warehouses from a bioterrorism
attack/infiltration.
· Cooperate with border communities to secure federal resources and high prioritization for infrastructure enhancements at Arizona border ports of entry.
· Secure state and federal designation of CANAMEX in Arizona
· Develop a statewide freight and logistic strategy.

Multi-state Coalition
· Complete the Hoover Dam Bypass Project, also referred to as the Colorado River Bridge
· Implement a 511 deployment initiative to incorporate tourism information and increase interoperability between states.
· Launch an aggressive and focused political outreach and marketing campaign to secure funding and to increase visibility.
Canada
· Broaden collaboration through a multi-dimensional approach rooted in business development as a means to drive growth in the Corridor. Components include policy, trade, infrastructure and research
· Determine merits for inclusion of Alaska into U.S. federal designation.
Mexico
· Advocate for federal designation of CANAMEX route; multi-state coalition and bi-national work plan resulting in short to
long term priorities (e.g., ACE, 911/511, Port Hours of Operation).


http://www.canamex.org/PDF/CyberPortExecutiveReport.pdf


Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

luckee1

  • Guest
Quote
Our transportation system and transportation systems all over the world are being redesigned to facilitate “supply chain management.”  The monopoly cartels will control all supplies through supply chain management.  For example, Dell Computers have lots of components.  Each component generates orders and each of these generates lots of smaller orders.  The idea is that if you want to stay in business, you control all aspects of the supply chain, thereby putting everyone else out of business.

Thus, we have to break up the monopolies.  It seems that Sec. of Treasury Paulson and Fed Reserve Chairman Bernanke want to set up an E-Bay style auction to handle the junk assets.  Only in this reverse auction, the government rewards the lowest bidder.  This is essentially D-Day for the capitalistic system and it gives Secretary Paulson unprecedented control over the economy and the system.  It also sets up a new market mechanism.  It is not a bail out, per se.  All these pieces of legislation have U.N. Agendas embedded in them.   If you control the supplies - you control country.

It sounds like someone figured that Walmart had a great idea.  And put it into practice.   :-\

That George Air Force Base model looks like that funny hypoteneuse thing again   :o

The ITS system, did it say voice recognition?  As in if the chip is in you it will hear and recognize voices of whomever speaks to you?????


Anti-Illuminati strikes again!  Thanks man for drawing the pics for me!   :)

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
IBM, UNISYS And Partner Corporations Push Supply Chain Eugenics
http://www.prisonplanet.com/ibm-unisys-and-partner-corporations-push-supply-chain-eugenics.html
Chris Paine Prisonplanet.com Tuesday, July 28, 2009

The global elite sure love to flaunt their intentions in front of the masses. Take the recent IBM propaganda push for the Global Information Grid (GIG) (ad 1, ad 2, ad 3) technology or “Smart Grid” as they call it. Their most brazen push so far is blatantly showing how all of your personal information would be accessible from a single database that is connected to multiple agencies around the world. They even push their eugenics propaganda when they talk about “tailoring vaccines to your DNA”.  These ads run multiple times a day on national television right now!

   UNISYS, an international computer security firm that has ties to virtually all sectors of the government, is actually taking on the eugenics agenda from a technological perspective called “Supply Chain Eugenics”. According to their recent propaganda video, they describe the many facets of industry that their security technology can protect or control by using Artificial Intelligence software that can determine problems or attacks before they occur. This software is oddly familiar to the capabilities of the AI software recently coming back out into the spotlight known as Ptech. They also specifically make the point multiple times in their video that those who do not comply with the system “get left behind” and will die.

   The major example of a modern day place using this technology is the city of Minneapolis, Minnesota. During the bridge collapse over the Missouri River in 2007, the City’s Information website was being “bombarded” by traffic and needed attention in order to help notify the general public of the disaster. The Chief Information Officer, Lynn Willenbring, states that UNISYS called her and offered to take over all of the IT functions of the city immediately in order to “fix” their problems, free of charge! Today, UNISYS runs all IT functions of transportation and security in the City of Minneapolis, with street cameras and database “protection” software. They also have wireless broadband anywhere in the city, accessible by businesses and citizens alike.

   However, while all of those things may seem like nice “perks” and benefits, do not be fooled. They are all tools of control used by the NWO to suppress the population. They will have the power of  all of your personal data and total control over the use of the internet at their fingertips allowing them to make sure that people only travel where they say we can and only use what they provide for us and only hear what they want us to hear. It will be used to totally monopolize the markets and make everything function in their favor.

   The video provided by Anti-Illuminati Film Productions, shows how the UNISYS video is linked to Indira Singh’s testimony on Ptech, as well as accounts by John Zachman, the “father” of enterprise architecture (aka free thinking AI). It also shows how even 14 years ago in the Hollywood movie, “The Net” starring Sandra Bullock, the entire concept with Ptech (Gatekeeper in the movie) and the GIG going on right now, was thrown right in our faces and we didn’t even know it! In the wake of potential catastrophic events, lets hope that the majority of the world wakes up about this before its too late because the price of remaining unaware  is nothing short of slavery.

http://www.vimeo.com/5770472
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

luckee1

  • Guest
Sane look at the comments on the article.  This guy has more info.

Hack Says:
July 28th, 2009 at 8:16 am

FYI Unisys also runs the backend for the IPASS toll system on the Illinois Tollway allowing total access to the peoples driving movements.

The IBM RFID tracking grid is also in place here.

I’m so glaaadd the little white boxes on the poles w/ the solar panels every 1/4 mile can track me it makes me feel safe and important.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sane look at the comments on the article.  This guy has more info.

Hack Says:
July 28th, 2009 at 8:16 am

FYI Unisys also runs the backend for the IPASS toll system on the Illinois Tollway allowing total access to the peoples driving movements.

The IBM RFID tracking grid is also in place here.

I’m so glaaadd the little white boxes on the poles w/ the solar panels every 1/4 mile can track me it makes me feel safe and important.

Funny that since a new writer wrote it, that thread is almost troll free.  Look what happens when you remove the government trolls, an actual logic based discussion exposing the criminals. Wow, what a concept. No wonder why we are spending over $10 Billion a year on government trolling.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

luckee1

  • Guest
Funny that since a new writer wrote it, that thread is almost troll free.  Look what happens when you remove the government trolls, an actual logic based discussion exposing the criminals. Wow, what a concept. No wonder why we are spending over $10 Billion a year on government trolling.

Indeed!

Offline trailhound

  • Member
  • *****
  • Posts: 4,722
Quote
The NAFTA corridors are planned to be smart corridors, totally automated, with remote sensors so that they can ID the people in cars.  They will be designed to toll you by the mile using surveillance software of total domain awareness.  GIS (Geographic Information Systems), P-tech and Promis software technology will be used to establish command and control centers.




"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
HOW IS THIS NOT A WEAPONS SYSTEM?

~~~~~~~~~~~~~~~

IBM buying SPSS for 1.2 bln dlrs

http://rawstory.com/news/afp/IBM_buying_SPSS_for_1_2_bln_dlrs_07282009.html
Published: Tuesday July 28, 2009


US computer giant IBM announced on Tuesday that it has agreed to buy business analytics software firm SPSS for 1.2 billion dollars in an all-cash deal.

IBM's has offered the Chicago-based company 50 dollars a share, a more than 40 percent premium over SPSS's closing price of 35.09 dollars in New York on Monday.

The companies said in a statement that the deal is expected to close in the second half of the year and is subject to the approval of SPSS shareholders and regulatory clearances.

IBM said the acquisition will expand its software portfolio and business analytics capabilities, which allow companies to better control costs and allocate resources through data capture, data mining and statistical analysis.

According to an IDC study cited in the statement, the worldwide market for business analytics software is expected to grow four percent over last year to 25 billion dollars this year.

"With this acquisition, we are extending our capabilities around a new level of analytics that not only provides clients with greater insight -- but true foresight," said IBM's general manager for information management Ambuj Goyal.

"Predictive analytics can help clients move beyond the 'sense and respond' mode, which can leave blind spots for strategic information in today's fast paced environment -- to 'predict and act' for improved business outcomes."

IBM said predictive analytics technology can be used, for example, to reduce credit risk, increase customer loyalty and detect and prevent fraud.

"Clients will be able to identify which customers to target, how to reach them, when to make contact and the most appropriate action to take," it said.


"Predictive analytics will also be an essential component of the smarter business systems that IBM is helping companies and organizations build to help confront the complex challenges presented by the exponential growth of data."

SPSS, founded in 1968, employs some 1,200 people and has more than 250,000 clients around the world. Its revenue grew four percent in 2008 to 303 million dollars.

IBM announced meanwhile that it has acquired Ounce Labs, a privately-held company based in Waltham, Massachusetts that makes software designed to help firms reduce the risks and costs associated with security and compliance.

Financial terms of the deal were not disclosed.

"Ounce Labs solutions use advanced capabilities to scan software source code and identify potential security and compliance vulnerabilities during the earliest stages of software development," IBM said.

"Ounce Labs software can also help organizations to rapidly assess and remediate the level of risk posed to their businesses through their legacy applications."

IBM rational software general manager Daniel Sabbah said the acquisition would allow the company to "provide customers an end-to-end application security testing solution for managing security and compliance across all stages of the software delivery process."

Founded seven years ago, Ounce Labs has a clientele base that includes the US Defense Department and Lockheed Martin.

The purchases announced Tuesday came three months after IBM failed in a bid to buy Sun Microsystems, which was acquired instead by business software giant Oracle.

IBM's share price lost 0.34 percent to 117.23 dollars in early trading in New York on Tuesday.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
HOW IS THIS NOT A WEAPONS SYSTEM?

~~~~~~~~~~~~~~~

IBM buying SPSS for 1.2 bln dlrs

http://rawstory.com/news/afp/IBM_buying_SPSS_for_1_2_bln_dlrs_07282009.html
Published: Tuesday July 28, 2009


US computer giant IBM announced on Tuesday that it has agreed to buy business analytics software firm SPSS for 1.2 billion dollars in an all-cash deal.

IBM's has offered the Chicago-based company 50 dollars a share, a more than 40 percent premium over SPSS's closing price of 35.09 dollars in New York on Monday.

The companies said in a statement that the deal is expected to close in the second half of the year and is subject to the approval of SPSS shareholders and regulatory clearances.

IBM said the acquisition will expand its software portfolio and business analytics capabilities, which allow companies to better control costs and allocate resources through data capture, data mining and statistical analysis.

According to an IDC study cited in the statement, the worldwide market for business analytics software is expected to grow four percent over last year to 25 billion dollars this year.

"With this acquisition, we are extending our capabilities around a new level of analytics that not only provides clients with greater insight -- but true foresight," said IBM's general manager for information management Ambuj Goyal.

"Predictive analytics can help clients move beyond the 'sense and respond' mode, which can leave blind spots for strategic information in today's fast paced environment -- to 'predict and act' for improved business outcomes."

IBM said predictive analytics technology can be used, for example, to reduce credit risk, increase customer loyalty and detect and prevent fraud.

"Clients will be able to identify which customers to target, how to reach them, when to make contact and the most appropriate action to take," it said.


"Predictive analytics will also be an essential component of the smarter business systems that IBM is helping companies and organizations build to help confront the complex challenges presented by the exponential growth of data."

SPSS, founded in 1968, employs some 1,200 people and has more than 250,000 clients around the world. Its revenue grew four percent in 2008 to 303 million dollars.

IBM announced meanwhile that it has acquired Ounce Labs, a privately-held company based in Waltham, Massachusetts that makes software designed to help firms reduce the risks and costs associated with security and compliance.

Financial terms of the deal were not disclosed.

"Ounce Labs solutions use advanced capabilities to scan software source code and identify potential security and compliance vulnerabilities during the earliest stages of software development," IBM said.

"Ounce Labs software can also help organizations to rapidly assess and remediate the level of risk posed to their businesses through their legacy applications."

IBM rational software general manager Daniel Sabbah said the acquisition would allow the company to "provide customers an end-to-end application security testing solution for managing security and compliance across all stages of the software delivery process."

Founded seven years ago, Ounce Labs has a clientele base that includes the US Defense Department and Lockheed Martin.

The purchases announced Tuesday came three months after IBM failed in a bid to buy Sun Microsystems, which was acquired instead by business software giant Oracle.

IBM's share price lost 0.34 percent to 117.23 dollars in early trading in New York on Tuesday.

that looks familiar http://forum.prisonplanet.com/index.php?topic=121353.0
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline lavosslayer

  • Member
  • *****
  • Posts: 774
  • This is what happens after cats watch Obama...
d'oh, so much going on today.

lol no kidding bro no kidding! its like someone got a big bucket of shit and threw it into a fan and its going all over the place right now!
"Those who would trade freedom for security deserve neither" -- Benjamin Franklin

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Trust but verify: Security risks abound in the IT supply chain
http://gcn.com/Articles/2009/07/17/Commentary-ISC2IT-supply-chain-security.aspx?p=1
Jul 17, 2009

With one in 10 information technology products on the market considered counterfeit, and software products developed across the globe at risk of subversion, it is hard to overstate the national security concerns regarding the use of IT products delivered through the global supply chain.


Editor’s Note: This article was prepared collaboratively by members of the International Information Systems Security Certification Consortium's Government Advisory Board Executive Writers Bureau. The bureau includes federal IT security experts from government and industry. A full list of bureau members is available at www.isc2.org/ewb-usgov.



The cyber security risks inherent in the federal government's procurement of and reliance on IT hardware and software from various non-pedigreed sources have been well reported. Over a decade ago, the Defense Science Board Task Force on Globalization and Security published a telling report on the "Vulnerability of Essential U.S. Systems Incorporating Commercial Software."  In 2002, there were a number of well-publicized investigations of alleged terrorist-funded corporations that followed in the wake of the 9/11 terrorist attacks under the auspices of Operation Green Quest. Due to counterfeit computer components used in warplanes, ships and communication networks, the problem has now essentially come full circle in recent reports highlighting the actual threat to Defense Department and other government systems.

This article explores various cyber risks to the IT supply chain, which include theft of intellectual property, logic bombs and self-modifying code, deliberately hidden back doors and features for unauthorized remote access, as well as risks from fake or counterfeit products.

The fear of non-secure or even harmful foreign software dates back to the late 1990s, when federal agencies hired foreign contractors to rewrite code to keep systems from malfunctioning during the year 2000 date change. A report issued by the Defense Science Board (DSB) in 2007 was the first formal acknowledgement by DOD’s top advisory board that such security risks exist. The 2007 report highlights the seriousness of the problem, concluding: "Malicious code, which would facilitate system intrusion, would be all but impossible to detect through testing, primarily because of software's extreme and ever increasing complexity. ... Increased functionality means increased vulnerability."

The DSB was not alone in its projections. In 2006, the Association of Computing Machinery (ACM) published "Globalization and Off-shoring of Software" enumerating the risks to national security from government's use of foreign software. The number one risk identified in the ACM report was that difficulty understanding code pedigree could allow hostile nations, terrorists, criminals and other miscreants to subvert or sabotage software used in critical government systems.

However, the problem is not limited to risks stemming from software developed overseas or foreign-owned domestically controlled companies. It also extends to hardware and potential risks caused by counterfeit products or foreign-developed computer chips and microprocessors. Similar problems could be caused by home-grown terrorists and criminals.

The supply chain is complex and interwoven, with no clear line between software and hardware pedigree from source to government system. Risk is introduced any time that hardware and software transfer from the country/company of origin to a federal government end-user via a certified domestic distributor, a certified distributor in a second country/company or via a company's Web site or online auction site.

A recent white paper produced by KPMG and the Alliance for Grey Market and Counterfeit Abatement (AGMA) reported that one in 10 IT products currently on the market is counterfeit. Estimates from law enforcement are even higher. The paper also reported that this 10 percent counterfeit market is currently grossing more than $100 billion in annual revenue. The national security implications of these counterfeit and, in some cases, subverted products being used in sensitive government systems are of grave concern. This was substantiated in summer 2008, when the FBI reported that the Chinese government or Chinese hackers -- or both -- had used undetectable backdoors to access highly secure U.S. government and military computer networks by means of counterfeit Cisco routers and switches installed in nearly all government networks over 18 months.

These activities have major implications on the fundamental premise of cyber infiltration and espionage. Why send malicious code over the Internet if one can pre-infect software, computer parts or even consumer devices with logic-bombs, self-modifying code, deliberately hidden backdoors and so on? Further, why continue to follow the traditional, arduous, time-consuming model of recruiting and training thousands of covert operatives when you can hire a few "uber haxors" who can command readily available botnets to infiltrate the systems of target countries and exfiltrate the same (or even more) sensitive information from a broader range of targets?

The extent of cyber espionage and consequent data exfiltration were highlighted in a 2006 Government Computer News report,  in which Major General William Lord, U.S. Air Force chief information officer, stated that China had downloaded 10 to 20 terabytes of data from DOD’s unclassified (NIPRnet) network. This same type of incident was highlighted in a 2008 USA Today report, “Chinese Hacked Capitol Computers,” in which Rep. Frank Wolf (R-Va.) revealed that the FBI had identified four of his government computers that had been hacked by sources working out of China. The Congressman expressed his concern that the problem likely had gone further. "If it's been done in the House, don't you think that they're doing the same thing in the Senate?" he asked.

Analyses of U.S. government contracting processes and the IT supply pipeline expose some of the inherent risks to the supply ecosystem. From the time a purchase order is placed with a DOD/General Services Administration-approved and authorized vendor/reseller until the time the product is delivered to the government's mailrooms, government officials have little or no control over the various levels of sub-contractors or the sub-contractors’ sub-contractors that the DOD/GSA-approved vendor is using to fulfill these purchase orders. Although the following case-study is more germane to risks in the DOD IT Supply Chain, it does an excellent job of illustrating the risks from suppliers of unknown pedigree.

In October 2008, Business Week published a revealing article on “Dangerous Fakes.” One of the case studies featured Mariya Hakimuddin, an uneducated working mother, who owns “IT Enterprise,” a company she ran with her mother out of a modest one-story house in Bakersfield, Calif. Mariya began brokering military chips four years prior after friends told her about the expanding trade. Since 2004, she has won DOD contracts worth a total of $2.7 million. The military acquired microchips and other parts from IT Enterprise for use in radar on the aircraft carrier USS Ronald Reagan and the anti-submarine combat system of Spruance-class destroyers. Mariya said she knew little about the parts she bought and sold. She started her business by signing up on the Internet for a government supplier code. After DOD approved her application, with no inspection, she began scanning online military procurement requests. She plugged part codes into Internet search engines and found Web sites offering low prices. Then she ordered parts and had them shipped directly to military depots. Finding a suspicious transistor shipped by IT Enterprise, the Navy triggered an investigation of the company. In January 2009, the DOD suspended IT Enterprise, Mariya and her mother’s ability to supply to the military for three years. A month after Mariya was suspended, her husband, Mukerram, received his own supplier code, using the same home address with a new company name, Mil Enterprise. This time, DOD caught on more quickly, suspending Mukerram for three years as well.

Even more insidious could be the issue of potentially hostile foreign influence on offshore developers, resulting in malicious code and other intentional vulnerabilities embedded in products. This is perhaps best illustrated in the following a case study of PTech, a Boston-area software company.

In 2002, the FBI launched an investigation of PTech and its possible ties to terrorism during Operation Green Quest, which was a Customs investigation into Yasin al-Qadi and other suspected financiers. At the time, PTech’s risk management software was being used by the FBI, the Air Force, Navy and a host of other DoD and federal government agencies. One of PTech’s central investors was Yasin al-Qadi, who the FBI suspected to be financing terrorist groups. A CBS journalist who was the first to report on PTech, said: “The worst-case scenario is that this is a situation where this was planned for a very long time to establish a company in this country and in the computer software business that would target federal agencies and gain access to key government data to essentially help terrorists launch another attack.” While the FBI’s investigation of PTech was inconclusive and no one associated with PTech was ever charged, the impact of a similar scenario would be devastating to our national security. The company continues to do business with the government, albeit under a new name.

Approaching the solution

The gravity of IT supply chain risks is not lost on national security strategists. In January 2008, to combat the growing cyberspace threats, the White House issued Homeland Security Presidential Directive 23, calling for a national priority and plan for action to combat cyberspace threats. The directive considers the full spectrum of threat vectors -- network, supply chain, vendor, mission and bridge networks -- to address both internal and external threats. In brief, HSPD-23 has 12 initiatives, of which the 11th, “Develop Multi-Pronged Approach for Global Supply Chain Risk Management,” is specifically geared toward tackling risks in the IT supply chain. This is perhaps the most challenging of the initiatives.

The National Institute of Standards and Technology (NIST) is charged with developing guidance for CNCI Initiative 11 and has outlined the following sub-program areas to address as the basis of its multi-pronged approach for this Initiative:

Criteria for identifying federal government systems and networks requiring enhanced efforts to ensure supply chain risk management.
An approach for enhancing federal government technical expertise, guidance and standards to manage supply chain risk.
Lifecycle processes and standards.
A strategy to enhance federal government acquisition policy to address supply-chain risk based on a legal and policy evaluation of the potential application of intelligence community processes for supply chain risk management to non-IC departments/agencies, including the use of vendor threat information in acquisition.
Acquisition policy and legal analysis.
A process for sharing vendor threat analyses across the federal government.


While the CNCI Initiative’s plan for tackling risks in the IT supply chain is still unknown, the work that has already been accomplished by other groups is encouraging. The Customs-Trade Partnership Against Terrorism (C-TPAT),  launched in November 2001 with just seven major corporate importers, has grown to become one of the largest and most successful public-private sector partnerships to emerge from the ashes of 9/11.

It is one of several U.S. Customs and Border Protection (CBP) initiatives implemented after 9/11 to achieve CBP’s twin goals: security and facilitation. C-TPAT’s main vision is to safeguard the trade industry from terrorists and to provide benefits and incentives to private sector companies that meet or exceed C-TPAT supply chain security criteria and best practices. The C-TPAT recommends that industry partners develop minimum security practices (especially applicable to point of origin and point of staffing) , ensuring that contracts and request for proposals include specific security language that stipulates that prior to conducting any business, suppliers must comply with specific security standards, policies and procedures. This includes accountability by federal agencies to focus on foreign manufacturers and a more rigorous clearance process. Many C-TPAT companies are now contractually requiring businesses to improve security in order to meet C-TPAT guidelines. Examples of how C-TPAT companies leverage foreign suppliers to tighten security in the supply chain include:
Conducting regular audits of their vendors to ensure compliance with C-TPAT security guidelines.
Conditioning contractual business relationships with their service providers and vendors based on C-TPAT participation and/or adherence to security guidelines.
Leveraging the existing internal inspection team.
Obtaining cargo security training for quality assurance personnel or non-security related auditors who visit foreign vendors and factories on a regular basis.
Partnering with individual customs administrators to improve the coordination of mutual anti-terrorism efforts.


The work of the public–private sector partnership of the Software Assurance Forum for Excellence in Code (SAFECode) is also noteworthy. SAFECode was founded by EMC, Juniper Networks, Microsoft, SAP and Symantec. as a non-profit organization dedicated to increasing trust in information and communications technology products and services through the advancement of proven software assurance methods. SAFECode works to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services.

Our national reliance on IT hardware and software from various non-pedigreed sources is a foundation for major cybersecurity risks having national security implications. The incident reports cited in this article further highlight potential risks ranging from logic bombs and self-modifying code, deliberately hidden back-doors to potentially fatal equipment failure and even foreign espionage. Although the U.S. government has only scratched the surface in developing an approach to the solution, federal chief information security officers can take some comfort in the fact that one of the many CNCI initiatives is intended to meet this challenge head-on. As NIST advises, organizations must add “defense-in-breadth” to their strategy mix. While Defense-in-depth focuses on the operations phase of the systems development lifecycle, defense-in-breadth covers the entire lifecycle.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Anti_Illuminati

  • Guest
"Andrew Card was the White House Chief of Staff on 9-11.   He would have been involved in setting the stage for Bush on 9/11 - the school, the classroom, the sign behind Bush's head, "Reading makes a country great"  and the book,  "My Pet Goat".
 
Andrew Card was transportation secretary under the first Bush Administration with the ISTEA legislation was passed.  Appointed 1992. 
http://bushlibrary.tamu.edu/research/public_papers.php?id=3973&year=1992&month=2
 
Andrew Card testimony 1997 on the reauthorization of ISTEA
http://epw.senate.gov/105th/card.htm
 
Levin Report on the 'alternative analysis' that led to war on Iraq.
http://www.globalsecurity.org/security/library/congress/2004_r/index.html
 
The Making of the Iraq War
http://www.countercurrents.org/leopold210308A.htm
"For the average person, the names of these behind-the-scenes policy wonks won't have much meaning. But they are the architects of the Iraq War.

The White House Iraq Group (WHIG) was formed in August 2002 to publicize the so-called threat posed by Saddam Hussein. WHIG was founded by Bush's chief of staff Andrew Card and operated out of the vice president's office. The WHIG was not only responsible for selling the Iraq War, but it took great pains to discredit anyone who openly disagreed with the official Iraq War story." 
 
Of course we already knew about David Addington's connection to the transportation industry.  But something that makes sense now - is that David Addington defended Congressman William Jefferson, the guy who had the $100,000 in his freezer.  He was just recently convicted of taking or giving bribes.  When I researched Jefferson some years back, he was involved with some officials in an African country... guess what issue?   Transportation - Ports.
http://www.channelingreality.com/The_Coup/New_Paradigm.htm
 
AASHTO Legislative Update
http://transportation1.org/aashtonew/?sid=268
 
As we know, whenever you see mention of a pipeline and the U.S. or Europe was involved, think Global Supply Chain Corridor design - smart highway technology (police state), telecommunications, gas, oil pipelines, transmission lines."   
 
http://www.engdahl.oilgeopolitics.net/Geopolitics___Eurasia/Nightmare/nightmare.html

-Vicky Davis

Anti_Illuminati

  • Guest
See links for videos.

http://www.csail.mit.edu/csailspotlights/feature2



Precision Agriculture: Sustainable Farming in the Age of Robotics

Early in the fall of 2008, students began gathering before a raised platform of fake grass. The artificial turf was adorned with evenly spaced tomato plants, nestled in sensible terra cotta pots. And while the small cluster of plants and grow lamps might have seemed incongruous under other circumstances, this was a garden with a twist: instead of being horticulturalists, the humans were there only to program and supervise. The caretakers of the plants would be entirely robotic.



The idea for the project came from work done by Nikolaus Correll, a postdoctoral assistant working in Professor Daniela Rus’ Distributed Robotics Lab. Correll, who came to CSAIL in 2007, saw the possible applications of swarm robotics to an agricultural environment. In the long view, the researchers hope to develop a fully autonomous greenhouse, complete with robots, pots and plants connected via computation, sensing and communication. Each robot is outfitted with a robotic arm and a watering pump, while the plants themselves are equipped with local soil sensing, networking, and computation. This affords them the ability to communicate: plants can request water or nutrients and keep track of their conditions, including fruit produced; robots are able to minister to their charges, locate and pick a specific tomato, and even pollinate the plants.

The system, which Rus refers to as precision agriculture, has a double advantage over the way crops are currently cultivated and harvested. First, due to each plant’s ability to monitor and broadcast its own physical state, water, nutrients and care will be dispensed on an as-needed basis. This kind of targeted specificity should allow for a great reduction in resources consumed in the growth process, ameliorating the heavy carbon footprint of today’s agriculture. Furthermore, a mechanical harvest removes the backbreaking work currently involved in reaping specialty crops such as fruit and vegetables. (By contrast, broad land crops such as small grains and hay are already being harvested in a way that is at least partially mechanized.)

The DRL is no stranger to work that fuses the robotic with the biological; other projects include mobile networks of underwater robots and cow herding with virtual fences. One quirk of this project is that while part of the research was undertaken during IAP in January, much of the work was begun by undergraduates organized into specialized teams to build a distributed robotic garden within the time frame of a course. This specificity required them to find innovative ways to develop their ideas and work together across project areas.

The course structure that Rus and Correll developed allowed for the tasks (such as object recognition or navigation) to be addressed in great detail by a handful of students. What the pair found, as the class went on, was that the small, specialized teams were serving a dual purpose. Not only did the specific groups allow for greater concentration on discrete tasks, but communication between groups led to a surprisingly high level of information sharing. The result? The combination of specialization and communication led to a nuanced collective understanding of the project as a whole that might have been difficult to obtain in any other way.

This collaborative approach to robotics is part of a larger shift going on in the field. In the past five to ten years, the field has seen increasing cooperation on projects of greater and greater complexity. Frequently, the tools generated in this process can be recycled for use in still more work, creating a kind of open source community of roboticists. In the garden project, for example, the students were able to use several projects already under development in CSAIL.

A tool called LCM, or Lightweight Communications Marshaller, was used to allow the different robotic modules to communicate; the version used in the project came from the DARPA Grand Challenge Vehicle. The object recognition is built on the back of LabelMe, an image annotation tool pioneered by Bryan Russell and Professors Antonio Torralba and Bill Freeman. And the robotic bases themselves? Re-imagined versions of iRobot’s Roomba.

Ultimately, the project’s goal is to foster excitement in the roboticists of the future about what is possible; in this, it has succeeded with flying colors. At its end, there was an incredibly high level of enthusiasm about the things accomplished during the semester and the work ahead. Students from nearly every specialized group chose to stay on for the January interterm period to develop their findings further.

Correll is optimistic about future applications of the project and others like it. Looking past agriculture, he ruminated on other tasks to which this sort of system can be applied down the line. Tasks, for example, like automating services for older adults with low mobility in residential care facilities, or tending to plants in greenhouses or hydroponic farms. The technology, once perfected, is immensely adaptable, and hints at an exciting future of collaboration between humans, the natural world, and our machines.
_____________________________________________________________
http://www.csail.mit.edu/csailspotlights/feature3



Agile Robotics: Autonomous Forklift

The field of robotics began relatively modestly. Its founders attempted to create simple machines capable of performing tasks or interacting with the world. But in doing so, the first roboticists opened the door to an amazing area of study, rich with possibilities for extraordinary contributions to the greater good.



By exploring the burgeoning field of agile robotics, CSAIL researchers are taking those ideas to the next level. Collaboratively, the lab is trying to build “a robot that behaves predictably and naturally, and can be commanded naturally,” says Professor Seth Teller. This points to a robust, sustainable, long-term vision of robotic autonomy whose myriad possibilities suggest exciting things to come.

In the beginning, most robots were designed very narrowly for a specific task. In the case of factory-floor robots, for example, the machines were physically confined to a designated area and proscribed from human interaction. By keeping the humans strictly away from the robots, the environment in which the bot existed could be carefully controlled. But in recent years, there has been growing interest in creating robots that are able to interact with humans in a shared environment.

This need has led to the development of a new kind of robotic paradigm. To function in the spaces humans have engineered for themselves, a robot needs to be many things. Mental, physical, and situational agility, among other things, are key – the ability to evaluate and respond to a situation and the intelligence to come to a conclusion, as well as the perceptual abilities needed to sense the world around it and the physical dexterity to act according to those sensations.

The largest such project currently underway at CSAIL is an autonomous robotic forklift being developed for military application. Being developed in collaboration with Draper and Lincoln laboratories, the forklift will be one of the most sophisticated instruments the lab has ever built. It is intended to move pallet loads from place to place under voice command, and eventually to pack up an entire outdoor warehouse of pallets and transport it to a new location. Sponsored by the United States Army Logistics Innovation Agency, the forklift is designed to operate in unstructured environments such as outdoor packed earth or gravel regions.

It is unique in that, while perfectly capable of operating as an autonomous vehicle, it will also be able to function as an operator-driven machine. If a situation arose in which it encountered a task beyond its abilities, this enables the robot to be assisted by a nearby human, who could simply climb into the operator’s cabin and operate the robot through the difficulty. The challenges involved in such a project are significant, which has led to the involvement of over twenty principal investigators at the lab.

Teller is the project’s lead; other team members include CSAIL’s Stephen Proulx, Nicholas Roy, Daniela Rus, Russ Tedrake, Matt Walter, Luke Fletcher, and others from outside entities such as Lincoln Labs and Draper Laboratories. Student contributors, including Sertac Karaman, Brandon Luders, Jeong hwan Jeon, and Andrew Correa, similarly lend the project their expertise. Experts in mechanical design, electrical engineering, speech, interface issues, safety, systems architecture, control, planning, perception, and more are each bringing their particular skills to bear on the problem solving process.

Now beginning its second year, the project is arriving at a point where pallet manipulation is already a reality; the researchers are looking ahead to higher-level reasoning, improved dexterity and the manipulation of smaller objects such as individual boxes. Development of a natural command interface – designing and building a robot capable of understanding human speech, for example – is also among the many issues currently being addressed.

The forklift comes at an interesting crossroads in the history of robotics. In the past, a great deal of the code for robotics projects needed to be generated afresh for each new machine. But the spine of the forklift project is code that was written for the DARPA Grand Challenge vehicle, then lifted out and modified for this application. This represents a potentially influential precedent for the standardization of a code base in autonomous vehicles, even as the amount of code being made available online is increasing.

It is a type of collaboration that CSAIL has been pioneering since its inception. The spirit of working in teams to combine expertise is a core part of the lab that is being extended even further in this particular project. Says Professor Russ Tedrake, “I think that just in general, our robotics research is more vibrant when we’re talking more. You can talk in meetings, but solving problems together is a good way to understand the techniques that your neighbor is using and that leads to better research in general.”

This kind of melting pot of ideas acts as a catalyst, advancing the state of the art and leading to broader exploration of exciting ideas in the future. Researchers are seeking solutions to the problem of enabling robots to work alongside humans in spaces designed by and for humans, and the developments that arise from their work are likely to change the way we interact with robots at home, at work, and in the wider world to come.

Offline trailhound

  • Member
  • *****
  • Posts: 4,722

"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

Anti_Illuminati

  • Guest
http://www.ameinfo.com/122975.html

Booz Allen Hamilton suggests how to reinvigorate electricity, water, and transportation systems

* United Arab Emirates: Sunday, June 10 - 2007 at 11:17

Every major city around the world has its own story of electricity, transportation, or water systems in crisis.

Although the circumstances vary from one urban area to the next, they all have one thing in common: The critical infrastructure that is taken for granted by both their citizens and their government leaders is technologically outdated, woefully inadequate, increasingly fragile, or all of the above. In some cities, the quality of water, power, and transportation infrastructure is noticeably declining. In others, it was never very good to begin with. And few cities have enough of it to meet future needs.

"The Middle East region faces the same challenges as any other region in the world when it comes to electricity, transportation and water systems," said Walid Fayad of Booz Allen Hamilton.

    "The countries here must work alongside the private sector to build a lasting infrastructure that will have positive benefits for years to come,"



he added.

An estimate developed by Booz Allen Hamilton suggests the magnitude of the problem. Over the next 25 years, modernizing and expanding the water, electricity, and transportation systems of the cities of the world will require approximately $40 trillion — a figure roughly equivalent to the 2006 market capitalization of all shares held in all stock markets in the world.

But the cost of not meeting the challenge could be even greater than $40 trillion. A city's ability to respond effectively to a crisis for instance, such as pandemic disease or a terrorist attack, also depends on robust infrastructure: not just standard access to water, power, and mobility, but the extra capacity and backup needed for life under duress. In short, although the threats of global climate change and terrorist attack have occupied much of the industrialized world's collective attention, inadequate and fragile urban infrastructure could well do more harm to a larger number of people. Sooner or later, the money needed to modernize and expand the world's urban infrastructure will have to be spent.

Infrastructure fatigue

The demand for essential infrastructure is exploding. The world's population is projected to increase by one-third, to exceed 8 billion by 2050, with — for the first time in human history — more than 50 percent of humanity living in metropolitan areas. The requirements for water, power, and mobility will rise accordingly, even as population density makes it more difficult to build and protect the robust infrastructure needed to satisfy that demand.

The typical life cycle of urban development also reinforces demand for infrastructure. As more people live and work in metropolitan areas, they need and expect more affordable housing. The default result, barring a coordinated effort to align mass transit systems and transit-oriented development, is a sprawling metropolitan area encompassing miles of suburbs — and in less-developed countries, shantytowns. In such low-population-density environments, roads and highways become the only transportation mode that works. This, as we have seen time and again, becomes a recipe for gridlock. Water and electricity grids must also serve more people over greater distances than in the past.

Meanwhile, the quality and quantity of supply are increasingly threatened everywhere in three primary areas: power, transportation and water. The need for better facilities and infrastructure to deliver more of these to growing populations is greater than ever.

These three problem areas would be challenging enough if they were happening separately. But they may all be hitting a crisis point simultaneously. Cycles of infrastructure fatigue seem to be timed in many metropolitan areas so that major replacement efforts will have to occur within a few years of each other — and decay in one technological arena may well exacerbate decay in others.

Citizens seem unwilling to make many concessions to improve the quality of their infrastructure. Urbanites regularly say they want to live in a place with high quality of life, but they resist the easiest means by which governments can pay for it: increased highway tolls, abandonment of water and heating fuel subsidies, and energy taxes. Because the political will to provide more than minimal services at the lowest possible cost doesn't exist in many places, delivering infrastructure services on a sustainable cost-recovery basis is beyond the financial ability of most urban authorities.

Many governments have responded to these pressures during the last few decades by muddling through. They fix problems in a piecemeal fashion, "satisficing" the population, giving residents just enough improvement so that they don't boil over in anger or move away. Some localities cope by refurbishing archaic technologies, without either the up-front investment or the eventual savings that a complete redesign would provide. Such incremental solutions not only fail to address the need for infrastructure, but exacerbate it in the long run, by drawing more people into the region without satisfying the need for better service.

Interdependence and imagination

What, then, would a comprehensive solution look like? It would start with recognition of the interdependence of the many players involved. Water, energy, and transportation, for example, are typically administered by different regulatory bodies and innovated by separate companies. That should change.

The roles played by the public and private sectors also need rethinking. Since the early 1990s, politicians and economists have engaged in a heated debate over a false dichotomy: Which form of authority is better at developing infrastructure, government or business?

Experience suggests that the best projects are those that make best use of the public-private relationship. The three basic stages of infrastructure management: design and approval, oversight and financing, and construction and operations, are the best ways to take advantage of this relationship.

Light-handed government

A genuinely effective planning process uses the government's convening power to create a transparent, open discussion from the start, with sufficient opportunities to hear from stakeholders and anticipate possible problems before the design is finalized. This requires straightforward and complete statements of the plan's objectives (unfortunately a real-world rarity), along with its costs and benefits, made clear to the public. It may also require a more coherent overlap between the geographic scale of a project and the coordination of authority.

Government, in short, is best positioned to lead the initial planning stages, but deftly and selectively, with a firm but light-handed oversight role that emphasizes goals instead of means.

Sustainable financing

The private sector should take the lead, meanwhile, in financing, pricing, and ownership. The most appropriate government role in financing is explicit without direct oversight management: setting up a transparent, non-preferential financing process and then allowing capital markets to bear the risk and reap the financial reward. Allocating and syndicating risks is one of the things that the private sector does best. It is particularly attractive to institutional investors because it is largely uncorrelated with other classes of financial assets available to them. And it can be profitable: Booz Allen estimates suggest that in 2006, five-year returns included 11 to 13 percent for airports, 10 to 13 percent for toll roads, 8 to 10 percent for rail passenger lines, and 10 to 14 percent for wastewater plants.

Using fees to reflect underlying costs is another critical component of a financially sustainable infrastructure sector. One way to accomplish this is through marginal pricing: charging more for "peak" service, such as rush-hour transportation or residential electricity use during early evening, when or where demand is high. Although this type of pricing is often criticized as making poor people pay more, it turns out to be the most effective way to create the kinds of feedback loops that improve cost performance and quality. And cities already have a great deal of experience using tax policies and targeted subsidies to overcome any regressive implications. Those who can't afford to pay for electricity or water can be guaranteed a minimum amount to maintain a decent quality of life.

Marginal pricing also provides an incentive for suppliers of energy, transportation services, and water to provide higher overall value. And there is increasing evidence that the public will not just accept, but enthusiastically endorse, higher prices in exchange for greater quality. One prominent example is the "road pricing" highway fee system of Singapore and Hong Kong. London adopted the approach in 2002; since then, drivers who bring their automobiles into the inner-city traffic zone have been charged a daily fee (originally £5, later raised to £8). As a mechanism to control traffic, the program is a success. In the first six months of the plan, 60,000 fewer vehicles entered the zone than in the year before. Sixty percent of this reduction was the result of people shifting to public transport, 20 to 30 percent was attributable to drivers avoiding the zone altogether, and the remainder was attributed to car sharing (the British expression for carpooling). Travel times in and out of the zone were reduced by 15 percent.

This scheme has certainly generated some controversy; critics accuse it of merely displacing the gridlock to outer London. But according to a 2006 Royal Automobile Club report, 63 percent of motorists approve of the system, especially if the money is used to improve the roads and public transport. It has also led to stronger support for employer incentives to encourage bicycle commuting (with office showers and secure bicycle parking), telecommuting, car sharing, and other congestion-reducing schemes.

Another example is the willingness with which consumers pay for bottled water and in-home water filtration systems; they will pay a premium for what has historically been viewed as the most essential of infrastructure services, but in return they demand quality and a level of control.

Because marginal pricing reflects the real value of infrastructure services, it is essential for effective development, upgrading, maintenance, and conservation. Without it, private-sector decision makers cannot accurately forecast returns on investment; they will avoid infrastructure projects, believing that they will never truly generate returns adequate for the risks. To avoid some form of marginal pricing is, in effect, to subsidize the users of peak-demand services, which are always more expensive to provide. By contrast, "one-price-fits-all" approaches systematically encourage wastefulness and unsustainable development; consumers are not penalized when their use of water or electricity or their travel burdens the whole system, and thus they continue to waste the city's resources.

Making cities magnetic

The final important area for change is in construction and operations. Governments are rarely equipped with the management skills needed to make projects work in an entrepreneurial, multifaceted global economy. Hampered by cumbersome procurement rules and local political constraints (the demand for local jobs, for example), they can't leverage scale or speed in their supply chains to minimize costs. What's more, the private sector can attract more innovators who could bring novel ideas to a major construction effort.

Therefore, the government's role in construction and operations should be limited to oversight — not through enforcing rules and procedures, but through setting goals and incentives, establishing the criteria for success, and selecting the contractors in a structure that encourages both collaboration and competition within a project. This would allow the private sector to conceive and implement more novel, creative, and profitable infrastructure systems at lower costs. Ideally, excess revenue generated from innovation and efficiency would be retained by the private contractors, since they would also have taken on the lion's share of the risks.

Some of the best-managed airports in the world are run this way. The government of the Netherlands, rather than choosing to manage Amsterdam's Schiphol International Airport directly, formed a private corporation called the Schiphol Group. It operates the airport, leases the retail stores and office space, and runs associated logistics and data center businesses. In this case, it is owned by the State of the Netherlands, the City of Amsterdam, and the City of Rotterdam, but it could also be a publicly held company.

Where this kind of arrangement has worked, private contractors regularly provide comprehensive updates on the operations, detailing ongoing costs, maintenance needs, supply-demand balance, and the status of upcoming phases. The government, as well as non-governmental organizations and local citizens, can easily and publicly respond to this information, pointing out the deficiencies in the company's plans so they can be addressed before it is too late. The profession of asset-management specialists is emerging to help both public and private organizations navigate these new types of partnerships, bringing in awareness of best practices from around the world, and helping to define the incentives and procedures that will lead to better results.

One last change would also help: In conventional infrastructure initiatives, the same engineers who build the project often have a hand in approving it. That is a recipe for abuse, and it led, in the 1970s, to a backlash; one motto of the antidevelopment movement was "don't trust the experts." Both the abuse and the lingering backlash attitude from past abuses must be discarded. The relationship between the builder and the approver must be kept at arm's length, but it need not be adversarial. There should be a thorough, up-front exercise in cost-benefit analysis, open to all onlookers, done in time to influence the decision. Incentives for meeting goals in quality, longevity, environmental impact, and employment should be clarified before companies bid for a project.

As people pour into cities, the abundance of power, water, and mobility will define their lives. Problems like this $40 trillion challenge are not solved overnight, and muddling through will probably work, as a substitute for strategy, for another five years. But the sooner we think about it comprehensively, the less expensive the solution will be.

"We are quite fortunate that we can see the problem that lies ahead," concludes George Sarraf of Booz Allen Hamilton. "Governments and businesses can commit to remaking our future through suitable investment to the benefit of everyone. The only question is one of commitment on their part."

In the end, some cities will organize their infrastructure more effectively than others. They will figure out how to balance public and private interests; how to put the right incentives in place for resilience and growth; and how to leverage the relationships between water, power, and transportation. They will become the cities of opportunity; they will be the cities, for example, where many readers of this magazine will choose to work and live. They will become centers of growth and innovation for the farsighted companies of the next 100 years. And they will become magnets for humanity, standing on the platform of quality infrastructure: a platform that goes generally unnoticed — except when it doesn't work.


Offline trailhound

  • Member
  • *****
  • Posts: 4,722
  ^Its what Alex talks about alot, the control grid.  Thanks for the documentation Anti-Illuminati. 


 

"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile



2008 ...........
2008.........
2008 ..........
This was put out  in ^^^^^^^^^^^^^^^

So umnnnn  why does this resemble  

 A plan to place the whole country in Lockdown .... Perhaps because it is ?

Umnnnn man WTF wow ......... any one care to gander what year they plan to implement full lockdown ?

Yes yes yes I know everything else shows  that all of these NWO f**kers are tied to everything and then everything  that allows the GIG to work  etc.... but umnnnn Yeaaaaaaaaaaah  umnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
yeah .... /me looks up at my prior question semi-rhetorically at the moment ..... :/
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline trailhound

  • Member
  • *****
  • Posts: 4,722



2008 ...........
2008.........
2008 ..........
This was put out  in ^^^^^^^^^^^^^^^

So umnnnn  why does this resemble  

 A plan to place the whole country in Lockdown .... Perhaps because it is ?

Umnnnn man WTF wow ......... any one care to gander what year they plan to implement full lockdown ?

Yes yes yes I know everything else shows  that all of these NWO f**kers are tied to everything and then everything  that allows the GIG to work  etc.... but umnnnn Yeaaaaaaaaaaah  umnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
yeah .... /me looks up at my prior question semi-rhetorically at the moment ..... :/


 :-\ next tuesday after lunch? (sarc)

"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

H0llyw00d

  • Guest
........ No wonder why we are spending over $10 Billion a year on government trolling.

Explain please, and thank you for the info

Offline kidA

  • Member
  • ****
  • Posts: 282
^ Out of all the amazing information from this thread, you choose to worry about that? ::)
5 o'clock news is a f*#cking fantasy!

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
^ Out of all the amazing information from this thread, you choose to worry about that? ::)

............. ....  right .... lol ......
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile



2008 ...........
2008.........
2008 ..........
This was put out  in ^^^^^^^^^^^^^^^

So umnnnn  why does this resemble 

 A plan to place the whole country in Lockdown .... Perhaps because it is ?

Umnnnn man WTF wow ......... any one care to gander what year they plan to implement full lockdown ?

Yes yes yes I know everything else shows  that all of these NWO f**kers are tied to everything and then everything  that allows the GIG to work  etc.... but umnnnn Yeaaaaaaaaaaah  umnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
yeah .... /me looks up at my prior question semi-rhetorically at the moment ..... :/




SO UMNNNN at this point 2012 / 2014 ?!!!!!!!!!!!!!
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
https://www.strategicstudiesinstitute.army.mil/pubs/people.cfm?authorID=108

http://www.cfr.org/bios/3301/stephen_e_flynn.html

 Stephen E. Flynn


Media downloads:
High-resolution photo (JPG, 372K)
One-page bio (PDF, 56K)
CV (PDF, 78K)
Video clip (MP4, 2.1 MB)
Video clip (MP4, 1.3 MB)
 

 

Author of The Edge of Disaster: Rebuilding a Resilient Nation (2007) and America the Vulnerable (2004). Former adviser on homeland security for the U.S. Commission on National Security (Hart-Rudman Commission) and retired Coast Guard officer. Researches and writes on issues related to homeland security.
Expertise:

Catastrophic terrorism; emergency preparedness; critical infrastructure protection;trade and transportation security; and border control modernization.
Experience:

Consulting Professor, Center for International Security and Cooperation, Stanford University (2006-present); member, Marine Board, National Academy of Sciences (present); consultant on homeland security, U.S. Commission on National Security (Hart-Rudman Commission (2000-2001); Director, Office of Global Issues, National Security Council (1997); Associate Professor, U.S. Coast Guard Academy (1994-99); Guest Scholar and Visiting Fellow, Brookings Institution (1991-94); Commanding Officer, U.S. Coast Guard, Cutter Redwood (1992-93); Commanding Officer, U.S. Coast Guard, Cutter Point Arena (1984-86); Commander, U.S. Coast Guard (retired).
Honors:

Maritime Security Service Recognition Award for Outstanding Worldwide Leadership (2005); Legion of Merit (2001); Coast Guard Academy Distinguished Alumni Achievement Award (1999); Annenberg Scholar-in-Residence, University of Pennsylvania (1993-94); International Affairs Fellowship, Council on Foreign Relations (1991-92); Distinguished Graduate, Fletcher School of Law and Diplomacy, Tufts University (1988).
Selected Publications:

"America the Resilient," Foreign Affairs (March/April 2008); "5 Disasters Coming Soon If We Don’t Rebuild U.S. Infrastructure," Popular Mechanics (online edition, October 19, 2007); The Edge of Disaster: Rebuilding a Resilient Nation (Random House 2007); “The Brittle Superpower” in Seeds of Disaster (Cambridge University Press, 2006); “A Port in the Storm Over Dubai,” New York Times (2006); “Port Security Is Still a House of Cards,” Far Eastern Economic Review (January/February 2006); “Think Inside the Box,” New York Times (2005); “U.S. Port Security and the Global War on Terror,” American Interest (Autumn 2005); “Color Me Scared,” New York Times (2005); “Our Hair is on Fire,” Wall Street Journal (coauthor, 2004); “The Neglected Home Front,” Foreign Affairs (September/October 2004); America the Vulnerable: How Our Government is Failing to Protect Us from Terrorism (HarperCollins, 2004); America—Still Unprepared, Still in Danger, Report of an Independent Task Force (Council on Foreign Relations Press, 2002); “Creating the Department of Homeland Security: Rethinking the Ends and Means,” Journal of Commerce (2002).
Education:

PhD, MALD, Fletcher School of Law and Diplomacy, Tufts University;

BS, U.S. Coast Guard Academy.

Related Links:
Stephen Flynn writes about America's infrastructure crisis on Anderson Cooper 360 (blog; January 28, 2009)

Read the 2009 Report Card for America's Infrastructure by the American Society of Civil Engineers

Stephen Flynn discusses what went right with U.S. Airways Flight 1549, on the Rachel Maddow Show (television interview; January 16, 2009)


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://users.hartwick.edu/malonel/malone/malone.html
Dr. Laurence J. Malone
Hartwick College



 
Dr. Laurence J. Malone, Professor of Economics and Department Chair, joined Hartwick College in 1986, when he completed the course work for the PhD at New School University.  He teaches Micro and Macroeconomics, International Economics, American Economic History, and Classical Political Economy.  His research interests in economics concentrate on government policies and economic development from the seventeenth century to the present.

Dr. Malone has authored and collaborated on three books.  He co-edited an anthology of selections from Adam Smith’s works, The Essential Adam Smith (Norton, 1986), with Robert L. Heilbroner.  His second book, Opening the West: Federal Internal Improvements Before 1860 (Greenwood, 1998), recasts our understanding of the development of the American frontier before 1860 and demonstrates that the federal government constructed roads and canals and improved rivers and harbors before settlers and railroads "conquered the West."  A third book, Learning Interdependence (University of South Carolina, 2001), was recently completed with Hartwick colleagues David Bachner and Mary Snider.  This interdisciplinary text explores the educational value of month-long international study-abroad programs for first-year college students.

Dr. Malone has been honored as a Carnegie Scholar (2001/02) by the Carnegie Academy for the Scholarship of Teaching and Learning (CASTL) and served as President of the Economic and Business Historical Society (2000/01).
 


"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura

Offline lordssyndicate

  • Moderator
  • Member
  • *****
  • Posts: 1,141
  • Stop The New World Order
    • LinkedIn Profile
http://news.fletcher.tufts.edu/podcasts/mp3/flynn.mp3

This CFR SHILL SPEAKS FOR HIMSELF !.....

Let's see I wonder think he has ties to NLE 2010?
Strategic  Studies ... for the army ..... hrmzz ... Sr . Fellow at the CFR!..

f**king Arrest this criminal now!
"Biotechnology it's not so bad. It's just like all technologies it's in the wrong HANDS!"- Sepultura