CISPA Treason Bill tries to trick public into thinking Nazi Cybernetics is legal

Author Topic: CISPA Treason Bill tries to trick public into thinking Nazi Cybernetics is legal  (Read 31442 times)

0 Members and 1 Guest are viewing this topic.

Offline oyashango

  • Member
  • *****
  • Posts: 3,524
  • 43 Trillion and counting
Forget SOPA, You Should Be Worried About CISPA

While most folks are looking elsewhere, it appears that Congress is trying to see if it can sneak an absolutely awful "cybersecurity" bill through Congress. We've discussed how there's been some fighting on the Senate side concerning which cybersecurity bill to support, but there's a similar battle going on in the House, and it appears that the Rogers-Ruppersberger bill, known as CISPA (for Cyber Intelligence Sharing and Protection Act) or HR 3523 is winning out, with a planned attempt to move it through Congress later this month. The bill is awful -- and yet has somehow already gained over 100 sponsors. In an attempt to pretend that this isn't a "SOPA-like" problem, the supporters of this bill are highlighting the fact that Facebook, Microsoft and TechAmerica are supporting this bill.

However, this is a terrible bill for a variety of reasons. Even if we accept the mantra that new cybersecurity laws are needed (despite a near total lack of evidence to support this -- and, no, fearmongering about planes falling from the sky doesn't count), this bill has serious problems. As CDT warned when this bill first came out, it's way too broad and overreaching:

    However, the bill goes much further, permitting ISPs to funnel private communications and related information back to the government without adequate privacy protections and controls. The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient.

If it's confusing to keep track of these different cybersecurity bills, the ACLU has put together a handy dandy (scary) chart (pdf) comparing them all. And what comes through loud and clear is that the Rogers-Ruppersberger CISPA bill will allow for much greater information sharing of companies sending private communication data to the government -- including the NSA, who has been trying very, very hard to get this data, not for cybersecurity reasons, but to spy on people. CISPA has broad definitions, very few limits on who can get the data, almost no limitations on how the government can use the data (i.e. they can use it to monitor, not just for cybersecurity reasons) and (of course) no real oversight at all for how the data is (ab)used.

CDT has put together a reasonable list of 8 things that should be done if politicians don't want to turn cybersecurity into a new SOPA, but so far, Congress is ignoring nearly all of them. Similarly, EFF is asking people to speak out against CISPA, noting that it basically creates a cybersecurity exemption to all existing laws. If the government wants your data, it just needs to claim that it got it for "cybersecurity purposes" and then it can do pretty much whatever it wants.

This is a really bad bill and it looks like it's going to pass unless people speak up.

http://www.techdirt.com/articles/20120402/04425118325/forget-sopa-you-should-be-worried-about-this-cybersecurity-bill.shtml

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
Even worse than SOPA: New CISPA cybersecurity bill will censor the Web

Published: 04 April, 2012, 01:18

An onrush of condemnation and criticism kept the SOPA and PIPA acts from passing earlier this year, but US lawmakers have already authored another authoritarian bill that could give them free reign to creep the Web in the name of cybersecurity.

As congressmen in Washington consider how to handle the ongoing issue of cyberattacks, some legislators have lent their support to a new act that, if passed, would let the government pry into the personal correspondence of anyone of their choosing.

H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America’s war against cyberattacks. But the vague verbiage contained within the pages of the paper could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties. Critics have already come after CISPA for the capabilities that it will give to seemingly any federal entity that claims it is threatened by online interactions, but unlike the Stop Online Privacy Act and the Protect IP Acts that were discarded on the Capitol Building floor after incredibly successful online campaigns to crush them, widespread recognition of what the latest would-be law will do has yet to surface to the same degree.

Kendall Burman of the Center for Democracy and Technology tells RT that Congress is currently considering a number of cybersecurity bills that could eventually be voted into law, but for the group that largely advocates an open Internet, she warns that provisions within CISPA are reason to worry over what the realities could be if it ends up on the desk of President Barack Obama. So far CISPA has been introduced, referred and reported by the House Permanent Select Committee on Intelligence and expects to go before a vote in the first half of Congress within the coming weeks.

More: http://rt.com/usa/news/cispa-bill-sopa-internet-175/
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
CISPA Amendment Allows DHS to Intercept Tax Returns
http://www.infowars.com/cispa-amendment-allows-dhs-to-intercept-tax-returns/

Perennial big government advocate Sheila Jackson Lee strikes again

Paul Joseph Watson
Infowars.com
Wednesday, April 25, 2012

An amendment introduced to the controversial CISPA bill by perennial big government advocate Rep. Sheila Jackson Lee would empower the Department of Homeland Security to intercept online IRS tax returns and any other Internet traffic deemed to transit networks owned by the federal government or operated on its behalf.

“Jackson Lee’s amendment (PDF) is broad enough to sweep in government contractors and university networks such as Internet2 and CENIC, said a telecommunications attorney who did not want to be identified because of client sensitivity. It also appears to cover open Wi-Fi networks run by federal agencies and networks in government-provided housing,” reports CNet’s Declan McCullagh.

Not only would the amendment give Big Sis the power to monitor all government networks, it could also, according to McCullagh and Ryan Radia, associate director of technology studies at the Competitive Enterprise Institute, “allow Homeland Security to monitor the communications of the federal courts and Congress, and intercept tax returns sent to the IRS.”

Given the fact that the Department of Homeland Security has already identified all kinds of mundane behavior as “suspicious activity” possibly indicative of terrorism, the prospect of the federal agency trawling through Americans’ 1040 forms is nothing less than chilling.

The CISPA bill has already come under attack from all sides of the political spectrum because it states that “notwithstanding any other provision of law,” companies may share information with the government, demolishing fourth amendment privacy protections.

Earlier this week Congressman Ron Paul slammed the legislation as a “Big Brother writ,” writing, “CISPA is essentially an Internet monitoring bill that permits both the federal government and private companies to view your private online communications with no judicial oversight, provided, of course, that they do so in the name of cyber security.”

Targeting Americans for spying and punitive measures through their relationship with the IRS has been a common theme in recent weeks, with a separate bill, the ‘Moving Ahead for Progress in the 21st Century Act’ (MAP-21), giving the IRS the power to revoke passports of Americans merely accused of owing $50,000 or more in back taxes.

Texas Democrat Jackson Lee has aggressively pushed for extra powers for the DHS on a number of different fronts, most recently when she promoted a program that places TSA agents on Houston buses as undercover spies tasked with interrogating passengers and searching bags.

Jackson-Lee also savaged a newly passed law that enables airports to evict TSA screeners and replace them with private security, ludicrously claiming that such changes would cause a new 9/11-style attack.

Jackson-Lee’s amendment will be debated during a House floor hearing tomorrow, with the full CISPA bill expected to face a vote on Friday amidst a crescendo of vocal opposition.
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline Ambriel

  • Member
  • *****
  • Posts: 1,683
  • Dare to resist
    • Consfearacynewz
http://news.yahoo.com/house-oks-cybersecurity-bill-despite-veto-threat-223445304--finance.html


The House ignored Obama administration objections Thursday and approved legislation aimed at helping stop electronic attacks on critical U.S. infrastructure and private companies.

On a bipartisan vote of 248-168, the GOP-controlled House backed the Cyber Intelligence Sharing and Protection Act, which would encourage companies and the federal government to share information collected on the Internet to prevent electronic attacks from cybercriminals, foreign governments and terrorists.

"This is the last bastion of things we need to do to protect this country," Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, said after more than five hours of debate.

More than 10 years after the Sept. 11 terrorist attacks, proponents cast the bill as an initial step to deal with an evolving threat of the Internet age. The information sharing would be voluntary to avoid imposing new regulations on businesses, an imperative for Republicans.

The legislation would allow the government to relay cyber threat information to a company to prevent attacks from Russia or China. In the private sector, corporations could alert the government and provide data that could stop an attack intended to disrupt the country's water supply or take down the banking system.

The Obama administration has threatened a veto of the House bill, preferring a Senate measure that would give the Homeland Security Department the primary role in overseeing domestic cybersecurity and the authority to set security standards. That Senate bill remains stalled.

House Speaker John Boehner, R-Ohio, said the administration's approach was misguided.

"The White House believes the government ought to control the Internet, government ought to set standards and government ought to take care of everything that's needed for cybersecurity," Boehner told reporters at his weekly news conference. "They're in a camp all by themselves."

Faced with widespread privacy concerns, Rogers and Rep. C.A. "Dutch" Ruppersberger of Maryland, the Intelligence panel's top Democrat, pulled together an amendment that limits the government's use of threat information to five specific purposes: cybersecurity; investigation and prosecution of cybersecurity crimes; protection of individuals from death or serious bodily harm; protection of minors from child pornography; and the protection of national security.

The House passed the amendment, 410-3.

The White House, along with a coalition of liberal and conservative groups and some lawmakers, strongly opposed the measure, complaining that Americans' privacy could be violated. They argued that companies could share an employee's personal information with the government, data that could end up in the hands of officials from the National Security Agency or the Defense Department. They also challenged the bill's liability waiver for private companies that disclose information, complaining that it was too broad.

"Once in government hands, this information can be used for undefined 'national security' purposes unrelated to cybersecurity," a coalition that included the American Civil Liberties Union and former conservative Rep. Bob Barr, R-Ga., wrote lawmakers Thursday.

Echoing those concerns were several Republicans and Democrats who warned of potential government spying on its citizens with the help of employers.

"In an effort to foster information sharing, this bill would erode the privacy protections of every single American using the Internet. It would create a 'Wild West' of information sharing," said Rep. Bennie Thompson of Mississippi, the top Democrat on the House Homeland Security Committee.

Said Rep. Joe Barton, R-Texas: "Until we protect the privacy rights of our citizens, the solution is worse than the problem."

Countering criticism of Big Brother run amok, proponents argued that the bill does not allow the government to monitor private networks, read private emails or close a website. It urges companies that share data to remove personal information.

"There is no government surveillance, none, not any in this bill," Rogers said.

Among the amendments the House approved was one by Rep. Justin Amash, R-Mich., that put certain personal information off limits: library, medical and gun sale records, tax returns and education documents.

"I don't know why the government would want to snoop through library records or tax returns to counter the cybersecurity threat," Amash said.

The House approved his amendment, 415-0.

Trumping any privacy concerns were the national security argument, always powerful in an election year, and Republicans' political desire to complete a bill that would then force the Democratic-led Senate to act.

The administration backs a Senate bill sponsored by Sens. Joe Lieberman, I-Conn., and Susan Collins, R-Maine, that gives Homeland Security the authority to establish security standards.

However, that legislation faces opposition from senior Senate Republicans.

Arizona Sen. John McCain, the top Republican on the Senate Armed Services Committee, said during a hearing last month that the Homeland Security Department is "probably the most inefficient bureaucracy that I have ever encountered" and is ill-equipped to determine how best to secure the nation's essential infrastructure. McCain has introduced a competing bill.

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
"This is the last bastion of things we need to do to protect this country,"

Lie.  The truth is:  "This is the last bastion (of free speech) and we need to destroy the masses and protect the bankers who destroyed this country".

Also, there is no veto threat, that's just a joke to make you think there is some opposition.  Remember the "veto threat" about the NDAA?  "I have objections to this bill, but I'm going to sign it anyways."

Offline Letsbereal

  • Member
  • *****
  • Posts: 58,615
  • Know Thyself
CISPA passes House in unexpected last-minute vote
27 April 2012
, (RT)
http://rt.com/news/house-cispa-vote-thursday-083/

The House of Representatives has approved Cyber Intelligence Sharing and Protection Act with a vote count of 248-168. The bill is now headed for the Senate. President Barack Obama will be able to sign or cancel it pending Senate approval.

Initially slated to vote on the bill Friday, the House of Representatives decided to pass Cyber Intelligence Sharing and Protection Act (CISPA) Thursday after approving a number of amendments.

Apart from cyber and national security purposes, the bill would now allow the government to use private information obtained through CISPA for the investigation and prosecution of “cybersecurity crime,” protection of individuals and the protection of children. The new clauses define “cybersecurity crime” as any crime involving network disruption or hacking.

“Basically this means CISPA can no longer be called a cyber security bill at all. The government would be able to search information it collects under CISPA for the purposes of investigating American citizens with complete immunity from all privacy protections as long as they can claim someone committed a 'cybersecurity crime.' Basically it says the Fourth Amendment does not apply online, at all,” Techdirt's Leigh Beadon said.

Declan McCullagh, correspondent from CNET News, says CISPA will cause more trouble than is immediately apparent.

“The most controversial section of CISPA is the language – that notwithstanding any other portion the of law, companies can share what they want as long as it’s for what they call a ‘cyber security purpose,'" he told RT.

The CISPA battleground in numbers

CISPA was introduced in the House last November.  Critics chided the bill, saying its broad wording could allow the government to spy on individual Internet users and block websites that publish vaguely defined ‘sensitive’ data.

"[CISPA] doesn’t really have any protections against cyber threats, all it does is make people share their information. But that’s not going to solve the problem. What’s going to solve the problem is actual security measures, protecting the service in the first place, not spying on people after the fact," Internet activist Aaron Swartz told RT.

The White House issued a statement Wednesday saying President Barack Obama would be advised to veto the bill if he receives it. The Obama administration denounces the proposed law for potentially giving the government cyber-sleuthing powers that would allow both federal authorities and private businesses to sneak into inboxes and online activities in the name of combating Internet terrorism tactics.

We asked our Twitter followers what they think of CISPA's possible adoption into law – and they don't seem happy.
->>>|:-) THE CITY INDIANS (-:|<<<-

Offline oyashango

  • Member
  • *****
  • Posts: 3,524
  • 43 Trillion and counting
House Approves Cybersecurity Bill Over Obama Veto Threat

04/26/12 06:32 PM E

The House on Thursday approved controversial cybersecurity legislation that the Obama administration has threatened to veto.

Members approved the Cyber Intelligence Sharing and Protection (CISPA) act, H.R. 3523, in a 248-168 vote that split both parties somewhat. The bill was supported by 42 Democrats, while 28 Republicans opposed it.

The House approved the bill after making a number of changes aimed at limiting the way the government could use the information that companies provide.

CISPA would make it easier for companies to share information with the government about the threats facing their networks. Supporters — Republicans and Democrats alike — said the proposal is a reasonable compromise between the need for privacy and security.

"The intelligence community has the ability to detect these cyber threats, these malicious codes and viruses, before they are able to attack our networks," said Intelligence Committee ranking member Dutch Ruppersberger (D-Md.). "But right now, federal law prohibits our intelligence community from sharing the classified cyber threat with the companies that will protect us that control the network, the AT&Ts, the Verizons, the Comcasts, those groups.

"We have the ability to give them the information to protect us, but yet we have to pass a law to do that."

The bill enjoyed strong bipartisan support before the administration issued a veto threat and sided with privacy advocates who argue the bill does not do enough to protect consumers' private information. The White House also wants regulatory mandates for critical infrastructure providers, which are not contained in CISPA.

Ruppersberger said earlier Thursday that Obama's veto threat of his bill was like a "kick in the solar plexus".

It also seemed to have the effect of peeling Democrats off the bill, as several Democrats took up Obama's arguments during floor debate.

"In an effort to foster information sharing, this bill would erode the privacy protections of every single American using the Internet," said Rep. Bennie Thompson (D-Miss.). "It would create a Wild West of information sharing, where any certified business can share with any government agency, who can then use the information for any national security purpose and grant the business immunity from virtually any liability."

Rep. Jared Polis (D-Colo.) added that the bill is an "unprecedented, sweeping piece of legislation that would waive every single privacy law ever enacted in the name of cybersecurity."

Republicans did allow several amendments to be considered that narrowed the scope of the bill, including proposals from members of both parties. One from Rep. Ben Quayle (R-Ariz.) would allow the government to use the information it collects only for five purposes, all related to protecting people and prosecuting crimes.

Others would prohibit the government from using certain electronic data as it works to fight cyber threats, narrow the definition of what information can be shared, and encourage the government to create procedures to protect privacy.

Even before those amendments, supporters argued that the bill has enough safeguards in it to ensure the privacy of consumer data.

"The bill includes significant safeguards to protect personal and private information," Rep. Rich Nugent (R-Fla.) said. "It significantly limits the federal government's use of that information that the private companies voluntarily provide, including the government's authority to search data."

The bill is one of four cybersecurity bills the House is expected to consider this week. The others are the Federal Information Security Amendments act (H.R. 4257), the Cybersecurity Enhancement act (H.R. 2096), and the Advancing America's Networking and Information Technology Research and Development act (H.R. 3834). House Republicans have put these three bills on the suspension calendar, a process usually reserved for non-controversial bills that will require them to pass by a two-thirds majority vote.

http://thehill.com/blogs/floor-action/house/224115-house-approves-cybersecurity-bill-over-obama-veto-threat

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Hey Congress, no one believes your total horseshit bills anymore.

Everyone knows they are to cover up crimes committed by Bilderberg bankster controlled operations.

Everyone now knows that CISPA is to cover up the trillions of violations of the 4th amendment occuring since dipship Armitage rolled out his Nazi Total Information Awareness commie operations.

Everyone knows that psychopaths Ruth David and the rest of ANSER's Homeland Security Institute have been engaging in wholesale acts of treason that have perpetuated our continued engagement in illegal occupations and police state activity at home.

Everyone also knows that ANSER Homeland Security Institute, Ptech, PROMIS, Infosys, SAIC, Booz Allen Hamilton, MITRE, and RAND are directly connected to these treasonous crimes against the American people and have carried out a majority of the false flags to continue their coup d'etat for the past decade at least.

Everyone knows that the authors of this bill are the true terrorists who's goal is to wipe America off the map and end our sovereignty.

You guys votin g on this bill are under MK Ultra mind control as exposed in recent operations to psyop US Senators for war funding legislation, are being extorted by the Phoenix Program's neutralization operatives, are being bribed and are too stupid to realize that the people who wrote this bill are also going to destroy the US dollar rendering your payoff worthless, or are true believers in a Satanic New World Order where they stupidly believe that the capstone gives a flying shit about them.

WAKE UP CONGRESS, YOUR LAST MINUTE BABY MOMMA DRAMA VOTING SPECTACLE DOES NOT MAKE THIS ILLEGAL BILL MAGICLY CONSTITUTIONAL.

THE BILL IS DEAD ON ARRIVAL, IT IS AS IF IT WAS NEVER WRITTEN.

IT HAS ZERO LEGAL AUTHORITY, IT IS AN OPEN AND TOTAL ACT OF WANTON TREASON AGAINST THE CONSTITUTION AND THOSE WHO TAKE AN OATH TO DEFEND IT.

YOU KNOW IT AND WE KNOW IT AND NOW YOU KNOW THAT WE KNOW IT.

SORRY THAT IBM AND OTHER NAZI CORPOARATIONS LIKE GENERAL ELECTRIC WHO SYSTEMATICALLY TORTURED AND MURDERED MILLIONS THROUGH SIMILAR ILLEGAL BILLS IN NAZI GERMANY GAVE YOU THE IMPRESSION THAT IT IS LEGAL...IT AIN'T IT NEVER WAS AND IT NEVER WILL BE.

HERE IS A BRIEF HISTORY OF THE CYBERCRIME COMMITTED BY THE PEOPLE WHO WROTE THE BILL, THEIR ACTIVE ROLES IN THE MASS MURDER OF AMERICANS, AND THEIR PLANS PLANS BY THEM TO KILL THOUSANDS MORE AMERICAN CITIZENS...



Live Free or Die Hard, PTECH, Next 9/11 the writing is on the walls
http://forum.prisonplanet.com/index.php?topic=71246.0

PTECH INDIRA SINGH
http://forum.prisonplanet.com/index.php?topic=72748.0

Live Free or Die Hard 2: Ptech/CVE.MITRE.ORG/DHS/Horizons/EA/IT Governance/USAID
http://forum.prisonplanet.com/index.php?topic=80222.0

PTECH Fullfills OMG Request for OODA Loop generation functionality.
http://forum.prisonplanet.com/index.php?topic=99539.0

PROMIS/Ptech/Choicepoint/Infragard/DIEBOLD=World ID/Carbon Tax/IPv6
http://forum.prisonplanet.com/index.php?topic=79634.0

Ptech used in Desert Storm - Future Combat Systems - Global Dictatorship
http://forum.prisonplanet.com/index.php?topic=91752.0

Ultra - rare mass data dump of Ptech related news articles
http://forum.prisonplanet.com/index.php?topic=95708.0

Ptech CONFIRMED-Booz Allen, *False Flag Warning* to usher in Internet2/GIG
http://forum.prisonplanet.com/index.php?topic=91740.0

PROMIS/Ptech makes compartmentalization obsolete. Key to total tyranny & C2
http://forum.prisonplanet.com/index.php?topic=79470.0

Avian Flu-Criticial Infrastructure, False Flag wargame-Ptech Lab in charge of CS
http://forum.prisonplanet.com/index.php?topic=98058.0

New World Order told Singh that her sources on Ptech "SHOULD BE KILLED"
http://forum.prisonplanet.com/index.php?topic=108802.0

Most Startling 9/11 Evidence(Ptech, Oklahoma, Saudis, etc)
http://forum.prisonplanet.com/index.php?topic=102913.0

Guardium-Israeli MOSSAD-Ptech, BAH Black Ops Cyber Conference in 48 hour
http://forum.prisonplanet.com/index.php?topic=109378.0

WTF? Ptech was contracted w/ Rocky Flats Nuclear Weapons Facility | DOE
http://forum.prisonplanet.com/index.php?topic=110276.0

"We helped carry out 9/11, now we have control of India's airspace with Ptech"
http://forum.prisonplanet.com/index.php?topic=92428.0

Legitimizing Unconstitutionality - DMV gets Ptech AI facial recognition software
http://forum.prisonplanet.com/index.php?topic=99421.0
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Insanity: CISPA Just Got Way Worse, And Then Passed On Rushed Vote
http://www.techdirt.com/articles/20120426/14505718671/insanity-cispa-just-got-way-worse-then-passed-rushed-vote.shtml
from the this-is-crazy dept


Up until this afternoon, the final vote on CISPA was supposed to be tomorrow. Then, abruptly, it was moved up today—and the House voted in favor of its passage with a vote of 248-168. But that's not even the worst part.

The vote followed the debate on amendments, several of which were passed. Among them was an absolutely terrible change (pdf and embedded below—scroll to amendment #6) to the definition of what the government can do with shared information, put forth by Rep. Quayle. Astonishingly, it was described as limiting the government's power, even though it in fact expands it by adding more items to the list of acceptable purposes for which shared information can be used. Even more astonishingly, it passed with a near-unanimous vote. The CISPA that was just approved by the House is much worse than the CISPA being discussed as recently as this morning.

Previously, CISPA allowed the government to use information for "cybersecurity" or "national security" purposes. Those purposes have not been limited or removed. Instead, three more valid uses have been added: investigation and prosecution of cybersecurity crime, protection of individuals, and protection of children. Cybersecurity crime is defined as any crime involving network disruption or hacking, plus any violation of the CFAA.

Basically this means CISPA can no longer be called a cybersecurity bill at all. The government would be able to search information it collects under CISPA for the purposes of investigating American citizens with complete immunity from all privacy protections as long as they can claim someone committed a "cybersecurity crime". Basically it says the 4th Amendment does not apply online, at all. Moreover, the government could do whatever it wants with the data as long as it can claim that someone was in danger of bodily harm, or that children were somehow threatened—again, notwithstanding absolutely any other law that would normally limit the government's power.

Somehow, incredibly, this was described as limiting CISPA, but it accomplishes the exact opposite. This is very, very bad.

There were some good amendments adopted too—clarifying some definitions, including the fact that merely violating a TOS does not constitute unauthorized network access—but frankly none of them matter in the light of this change. CISPA is now a completely unsupportable bill that rewrites (and effectively eliminates) all privacy laws for any situation that involves a computer. Far from the defense against malevolent foreign entities that the bill was described as by its authors, it is now an explicit attack on the freedoms of every American.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Published on Thursday, February 24, 2011 by Rolling Stone

Rolling Stone: Another Runaway General as Army Deploys Psy-Ops on U.S. Senators

by Michael Hastings


The U.S. Army illegally ordered a team of soldiers specializing in "psychological operations" to manipulate visiting American senators into providing more troops and funding for the war, Rolling Stone has learned – and when an officer tried to stop the operation, he was railroaded by military investigators.



Sen. John McCain walks with Lt. Gen. William Caldwell at Camp Eggers in Kabul, Afghanistan on January 6, 2009. (Photo/Senior Airman Brian Ybarbo/U.S. Air Force)

The orders came from the command of Lt. Gen. William Caldwell, a three-star general in charge of training Afghan troops – the linchpin of U.S. strategy in the war. Over a four-month period last year, a military cell devoted to what is known as "information operations" at Camp Eggers in Kabul was repeatedly pressured to target visiting senators and other VIPs who met with Caldwell. When the unit resisted the order, arguing that it violated U.S. laws prohibiting the use of propaganda against American citizens, it was subjected to a campaign of retaliation.

"My job in psy-ops is to play with people’s heads, to get the enemy to behave the way we want them to behave," says Lt. Colonel Michael Holmes, the leader of the IO unit, who received an official reprimand after bucking orders. "I’m prohibited from doing that to our own people. When you ask me to try to use these skills on senators and congressman, you’re crossing a line."

The list of targeted visitors was long, according to interviews with members of the IO team and internal documents obtained by Rolling Stone. Those singled out in the campaign included senators John McCain, Joe Lieberman, Jack Reed, Al Franken and Carl Levin; Rep. Steve Israel of the House Appropriations Committee; Adm. Mike Mullen of the Joint Chiefs of Staff; the Czech ambassador to Afghanistan; the German interior minister, and a host of influential think-tank analysts.

The incident offers an indication of just how desperate the U.S. command in Afghanistan is to spin American civilian leaders into supporting an increasingly unpopular war. According to the Defense Department’s own definition, psy-ops – the use of propaganda and psychological tactics to influence emotions and behaviors – are supposed to be used exclusively on "hostile foreign groups." Federal law forbids the military from practicing psy-ops on Americans, and each defense authorization bill comes with a "propaganda rider" that also prohibits such manipulation. "Everyone in the psy-ops, intel, and IO community knows you’re not supposed to target Americans," says a veteran member of another psy-ops team who has run operations in Iraq and Afghanistan. "It’s what you learn on day one."

When Holmes and his four-man team arrived in Afghanistan in November 2009, their mission was to assess the effects of U.S. propaganda on the Taliban and the local Afghan population. But the following month, Holmes began receiving orders from Caldwell’s staff to direct his expertise on a new target: visiting Americans. At first, the orders were administered verbally. According to Holmes, who attended at least a dozen meetings with Caldwell to discuss the operation, the general wanted the IO unit to do the kind of seemingly innocuous work usually delegated to the two dozen members of his public affairs staff: compiling detailed profiles of the VIPs, including their voting records, their likes and dislikes, and their "hot-button issues." In one email to Holmes, Caldwell’s staff also wanted to know how to shape the general’s presentations to the visiting dignitaries, and how best to "refine our messaging."

Congressional delegations – known in military jargon as CODELs – are no strangers to spin. U.S. lawmakers routinely take trips to the frontlines in Iraq and Afghanistan, where they receive carefully orchestrated briefings and visit local markets before posing for souvenir photos in helmets and flak jackets. Informally, the trips are a way for generals to lobby congressmen and provide first-hand updates on the war. But what Caldwell was looking for was more than the usual background briefings on senators. According to Holmes, the general wanted the IO team to provide a "deeper analysis of pressure points we could use to leverage the delegation for more funds." The general’s chief of staff also asked Holmes how Caldwell could secretly manipulate the U.S. lawmakers without their knowledge. "How do we get these guys to give us more people?" he demanded. "What do I have to plant inside their heads?"

According to experts on intelligence policy, asking a psy-ops team to direct its expertise against visiting dignitaries would be like the president asking the CIA to put together background dossiers on congressional opponents. Holmes was even expected to sit in on Caldwell’s meetings with the senators and take notes, without divulging his background. "Putting your propaganda people in a room with senators doesn’t look good," says John Pike, a leading military analyst. "It doesn’t pass the smell test. Any decent propaganda operator would tell you that."

At a minimum, the use of the IO team against U.S. senators was a misue of vital resources designed to combat the enemy; it cost American taxpayers roughly $6 million to deploy Holmes and his team in Afghanistan for a year. But Caldwell seemed more eager to advance his own career than to defeat the Taliban. "We called it Operation Fourth Star," says Holmes. "Caldwell seemed far more focused on the Americans and the funding stream than he was on the Afghans. We were there to teach and train the Afghans. But for the first four months it was all about the U.S. Later he even started talking about targeting the NATO populations." At one point, according to Holmes, Caldwell wanted to break up the IO team and give each general on his staff their own personal spokesperson with psy-ops training.

It wasn’t the first time that Caldwell had tried to tear down the wall that has historically separated public affairs and psy-ops – the distinction the military is supposed to maintain between "informing" and "influencing." After a stint as the top U.S. spokesperson in Iraq, the general pushed aggressively to expand the military’s use of information operations. During his time as a commander at Ft. Leavenworth, Caldwell argued for exploiting new technologies like blogging and Wikipedia – a move that would widen the military’s ability to influence the public, both foreign and domestic. According to sources close to the general, he also tried to rewrite the official doctrine on information operations, though that effort ultimately failed. (In recent months, the Pentagon has quietly dropped the nefarious-sounding moniker "psy-ops" in favor of the more neutral "MISO" – short for Military Information Support Operations.)

Under duress, Holmes and his team provided Caldwell with background assessments on the visiting senators, and helped prep the general for his high-profile encounters. But according to members of his unit, Holmes did his best to resist the orders. Holmes believed that using his team to target American civilians violated the Smith-Mundt Act of 1948, which was passed by Congress to prevent the State Department from using Soviet-style propaganda techniques on U.S. citizens. But when Holmes brought his concerns to Col. Gregory Breazile, the spokesperson for the Afghan training mission run by Caldwell, the discussion ended in a screaming match. "It’s not illegal if I say it isn’t!" Holmes recalls Breazile shouting.

In March 2010, Breazile issued a written order that "directly tasked" Holmes to conduct an IO campaign against "all DV visits" – short for "distinguished visitor." The team was also instructed to "prepare the context and develop the prep package for each visit." In case the order wasn’t clear enough, Breazile added that the new instructions were to "take priority over all other duties." Instead of fighting the Taliban, Holmes and his team were now responsible for using their training to win the hearts and minds of John McCain and Al Franken.

On March 23rd, Holmes emailed the JAG lawyer who handled information operations, saying that the order made him "nervous." The lawyer, Capt. John Scott, agreed with Holmes. "The short answer is that IO doesn’t do that," Scott replied in an email. "[Public affairs] works on the hearts and minds of our own citizens and IO works on the hearts and minds of the citizens of other nations. While the twain do occasionally intersect, such intersections, like violent contact during a soccer game, should be unintentional."

MORE

http://www.commondreams.org/headline/2011/02/24-4
Published on Thursday, February 24, 2011 by Daily Kos
Fire Lt. Gen. Caldwell NOW and End the "Psy-Ops" War Against Congress

by Tom Andrews

Lt. General William Caldwell needs to be fired. Now. General Caldwell, a three star general in charge of training Afghanistan troops allegedly ordered that the Army’s arsenal of psychological weapons of war be trained on Members of Congress and other “VIPs” in order to manipulate them into giving the Army more money and troops for its Afghanistan operation.

According to Rolling Stone, the head of an Army “Information Operations” unit in Afghanistan, Lt. Colonel Michael Holmes, has been under orders from Caldwell to find “pressure points” to use against the visiting Congressional delegations and secretly manipulate them without their knowledge. Holmes quoted the general’s Chief of Staff:  “What do I have to plant inside their heads?”

General Caldwell should face court marshal proceedings for violating his oath of office and US law. The Justice Department should launch an immediate investigation to determine just how widespread this propaganda operation is and how high up the chain of command it goes. Congress should act immediately as well. The House and Senate Armed Services Committees should schedule public hearings and the investigative arms of both houses, as well as the General Accounting Office, should launch investigations.

This latest Rolling Stone bombshell needs all the attention that the Obama administration and the Congress gave reporter Michael Hastings’ last story on an out-of-control General, Stanly McChrystal. This is worse. General McChrystal was guilty of frat boy style insubordination. Lt. General Caldwell, and whoever else was involved in this outrage, was attempting a form of military coup by attacking elected civilian leaders through psychological warfare. If you are frustrated by civilian control over your military, take them out. In this case the weapon of choice was the arsenal available to them by the Army’s psychological warfare operation. 

As a Member of the House Armed Services Committee, I was cognizant of the Pentagon’s use of spin to get the result that they wanted. I was in office for less than a month when I was invited for a personal “consultation” with the Chairman of the Joint Chiefs of Staff.  I am certain that Chairman Powell was less interested in my views of military strategy than he was of my vote.

MORE

http://www.commondreams.org/view/2011/02/24-9
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated


Military Report: Secretly 'Recruit or Hire Bloggers'
http://www.bradblog.com/?p=5862


A study, written for U.S. Special Operations Command, suggested "clandestinely recruiting or hiring prominent bloggers."

Since the start of the Iraq war, there's been a raucous debate in military circles over how to handle blogs --- and the servicemembers who want to keep them. One faction sees blogs as security risks, and a collective waste of troops' time. The other (which includes top officers, like Gen. David Petraeus and Lt. Gen. William Caldwell) considers blogs to be a valuable source of information, and a way for ordinary troops to shape opinions, both at home and abroad.


This 2006 report for the Joint Special Operations University, "Blogs and Military Information Strategy," offers a third approach --- co-opting bloggers, or even putting them on the payroll. "Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering," write the report's co-authors, James Kinniburgh and Dororthy Denning.

FULL REPORT: http://cryptome.org/covert-blogs.zip

THERE IS NO CONSPIRACY!!!!!!!!!!!!!!!

http://usacac.army.mil/CAC2/Repository/FM307/FM3-07.pdf

Watch this video, ASAP--and archive it with youtube downloader:
LTG William Caldwell addresses 2008 Milblogging Conference
http://www.youtube.com/watch?v=dhmEDtPjuzs

http://www.informationdissemination.net/2008/09/army-vision-of-new-media.html
_____________________________________________
http://smallwarsjournal.com/blog/fastsearch?tag=Stability+Operations

More on FM 3.07: Stability Operations

The Center for Strategic and International Studies (CSIS) International Security Program (ISP) hosted Lt. General William B. Caldwell, USA, Commanding General, United States Army Combined Arms Center and Ft. Leavenworth; to introduce Field Manual 3-07: Stability Operations yesterday. SWJ was able to attend and found the panel discussion very informative as well as interesting. We hope to post some highlights from the discussion here in the near future. In the meantime CSIS has posted video and audio at their web page for this event. The army's new stability operations doctrine calls for a comprehensive approach to stabilization efforts that envisions integration of a variety of stakeholders not traditionally combined as full partners in complex contingencies. The CSIS panel discussion included Ambassador John Herbst. Coordinator for Reconstruction and Stabilization, United States Department of State; Ambassador Dick Solomon, President, United States Institute for Peace; Ambassador Michael Hess, Assistant Administrator of the Bureau for Democracy, Conflict and Humanitarian Assistance, United States Agency for International Development; Samuel A. Worthington, CEO and president of InterAction, Nathan Freier, a senior fellow at CSIS, and Rick Barton, codirector of the Post-Conflict Reconstruction Project.

Posted in SWJ Blog on October 8, 2008 8:49 AM
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
At what point are we going to have real hearings and when is at least someone going to jail for this madness? This is so wrong!
Military Psy-Ops Used On U.S. Senators!
http://www.youtube.com/watch?v=egFfQ-nic_A
Report: Army targeted senators with psyops
General sought to manipulate VIPs in order to elicit more funding, troops, according to Rolling Stone article



Lt. Gen. William Caldwell ordered a specialized "psychological
operations" team to manipulate dignitaries visiting Afghanistan
and convince them to boost funding and troop numbers,
Rolling Stone reports.


msnbc.com
updated 1 hour 19 minutes ago 2011-02-24T13:16:19

The U.S. army reportedly deployed a specialized "psychological operations" team to help convince American legislators to boost funding and troop numbers for the war in Afghanistan.

The operation was ordered by three-star general in charge of training Afghan troops Lt. Gen. William Caldwell, Rolling Stone Magazine reported in a story published late on Wednesday.

An officer in charge of the unit objected when he was ordered to pressure the visiting senators and was harshly reprimanded by superiors, according to the magazine.

"My job in psyops is to play with people's heads, to get the enemy to behave the way we want them to behave," the officer, Lt. Colonel Michael Holmes, told Rolling Stone.

More: http://www.msnbc.msn.com/id/41753749/ns/world_news-south_and_central_asia/
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Hey wizards writting these illegal bills who think we do not know what the objective really is.

YOUR FRICKING ARCHITECTURAL DIAGRAMS ARE DECLASSIFIED AND PART OF THE PUBLIC DOMAIN YOU DUMB SHITS!

IO Sphere - About/Contact
"The Professional Journal of Joint Information Operations"
published by the Joint Information Operations Warfare Command (JIOWC)
[ed. - our thanks to them for permission to post their articles here]
contact info
IO Sphere
Joint Information Operations Warfare Command (JIOWC)
2 Hall Blvd STE 217
San Antonia, TX 78243-7008
http://www.au.af.mil/info-ops/iosphere.htm

2009 Winter
cover - "Next Steps"
Social Networking Services: The New Influence Frontier, by Efaw
Achieving Irreversible Momentum, by Dunbar
Countering Internet Extremism, by Thomas
Modeling Broadcasting Infrastructure, by Flatla
The View from the Army IO Proponent: Colonel David Haught Interview, by Whisenhunt
Working Together Downrange, by Garcia
Operations Security in an Age of Radical Transparency, by Murphy
The Long War: Peace Accords With the Militants and US/NATO Airstrikes in Pakistan, by Fasihuddin
Being a Bad Influence: 1944 or 2009?, by the Office of Strategic Services

2008 Fall
cover - "Collaboration"
Editorial, "Carrying IO Outside the Bubble" by Prichard
Employ Chaplains as an IO Asset in the War on Terror, by Ieva
The War of Ideas: The Unheard Voice, by Schmadeka
The Impact of Collateral Damage on the Taliban Insurgency, by Hussain
Red Teaming in EM Space, by Johanning and Winn
Beijing’s Rising Hacker Stars…How Does Mother China React?, by Henderson
US Public Diplomacy: Waiting for the War of Ideas, by Henderson
DOD Computer Network Operations: Time To Hit The Send Button, by Glebocki
A Voice for IO Broadcasting: David Bailey Interview, by Whisenhunt

2008 Summer
cover - "Eyes on the Future"
Editorials, "What Lies Ahead" by Roberts and "From the IO Front" by Marrs
Decisive Use of IO, by Lyman
PSYOP is a Nasty Term—Too Bad, Redux, by Jannarone and Doig
Who Paints the Landscape of War at the Start of the 21st Century?, by Sloggett
A (Pragmatic) Future of Joint Electronic Warfare, by Bourque
Capacity Building Solidifies Gains in Security: Task Force Marne’s Non-Lethal Targeting, by Carvalho
Combatting Cyber Extremism in the Global Environment, by Manganaro
Accounting for Bias in Broadcast Media Message Acceptance, by Allen

2008 Special Edition
cover - "The World Views IO"
In Search of the Greater IO Perspective , by the editors
“The Challenge of Information Operations” International IO Seminar, by Thomas
The Information Revolution and Information Security Problems in Russia, by Tsygichko
An Overview of Information Operations in the Indian Army, by Chatterji
A Discussion of Information Warfare from a Taiwanese Perspective, by Tschai Hui-chen
China’s Comprehensive IW-Strategy Link, by Thomas
Bulgaria: The Rise and Decline of Bulgaria’s Interest in Information Operations, by Tagarev
Ukraine: Information Operations in Countries of the Former Soviet Union, by Pocheptsov
Australia: Current Developments in Australian Army Information Operations, by Nicholas
Canada: Information Operations, by Moss
Israel: Information Operations Threats and Countermeasures, by Ben-Ari
Information Operations in Senegal, by Wardini
Argentina: The Challenge of Information Operations, by Ortiz
Chile: A Vision of Information Operations, by Neira

2008 Spring
cover - "Linking Virtual Worlds"
Applying IO in the Real World, by Dewar
Cyberskepticism: The Mind’s Firewall, by Thomas
A Multi-Dimensional Model for PSYOP Measures of Effectiveness, by Perry
Policing Pakistan’s Northwest Frontier: Fasihuddin Interview, by Whisenhunt
Ask the Cyber Insurgent, by Norris
Joint IO in Counterinsurgency Warfare: A Critical Gap in Capability, by Packwood
In the Mountains of Afghanistan: Brian Glyn Williams Interview, by Whisenhunt
Blogging to Win Hearts and Minds, by Vanderpot
The Marine Corps Information Operations Center, by MCIOC Corner Stone Staff

2008 Winter
cover - "Strategic Communicators"
Balancing and Assessing, by Borque
A Critical Analysis of the US Government’s Current Perception Management Efforts, by Martemucci
Strategic Communication: Distortion and White Noise, by Gramaglia
Hizballah: Deception in the 2006 Summer War, by Acosta
The Trouble With Strategic Comunication(s), by Murphy
Analysis of Layered Social Networks, by Hamill et al
Influencing Friends & Allies: The Role of the Combatant Commander, by LaBruzzo
Prospects for an Information Operations Force, by McMahon
On Being an Electronic Warfare Officer in Iraq, by Williams

2007 Fall
cover - "Countering Extremism"
The Language of Engagement and The Influence Objective, by Borque
Discrediting Suicide Bombing: An Information Strategy, by Whisenhunt
Countering Child Suicide Bombers: Interview With Brooke Goldstein, by Whisenhunt
Understanding Insurgent Brand Strategy, by Miller
Exploring Second Life: Interview with Cory Ondrejka, by Whisenhunt
US Engagement In Africa: A Case Study In AFRICOM Strategic Communications, by Franke et al
Perspectives on Influence and its Role in Counterinsurgency Operations, by Sloggett
A Primer For Deception Analysis: Psychological Operations’ Target Audience Analysis, by Stroh and Wendell

2007 Summer
cover - "Outfitting for Influence"
The Role of Information Operations Campaigns in Shaping a Political Reality: The American Experience as an Example, by Talley
The IO Range: Tackling Electronic Warfare, by Curby-Lucier
Some Thoughts on Networked Radicalization: Interview with Frank J. Cilluffo, by Whisenhunt
Uncertainty in Estimating Human Behavior, by Dick
Marketing As An Element Of Strategic Communication, by Matchette
A Framework for Analyzing & Developing Theater-Specific Information Operations, by Sloggett
Ethics, Counterinsurgency, and Perceptions in the Information Era, by Basilici
Winning the Information War: Principles and a Tenet, by Bourcy

2007 Spring
cover - "Focus the Message"
An Iranian View of US Psychological Operations in Iraq and Afghanistan, by Asisian
The Global Information Environment & 21st Century Warfare: Targeting Public Opinion in the 5th Dimension, by Schmidt
Intelligence Support to Contemporary Information Operations, by Sloggett
IO During the Malayan Emergency, by Bortree
Strategic Communications: Arab Media and the War in Iraq, by Irani
Cooperative Electronic Attack Using Unmanned Air Vehicles, by Mears
A Look at the Information Environment, by Romanych

2007 Winter
cover - "New Horizons"
IO In an Unpredictable World, by Geron
Welcome to the JIOWC, by Johnson
Tactical IO in Support of Time Sensitive Planning, by Carvalho
Awareness Through Agility: Teenagers as a Model for Terrorist Development of Situational Awareness, by Sheffer
Information Operations: The Challenges of Second Generation Insurgencies, by Sloggett
This Is Al-Jazeera, by Carney
Hezballah, Israel, and Cyber PSYOP, by Thomas
PSYOP in Stabilization and Reconstruction Operations: Preparing for Korean Reunification, by Mushtare
Southeast Asia Violent Ideology Seminar, by Whisenhunt
The War of Ideas in Southeast Asia: Interview with Kenneth Ward, by Whisenhunt

2006 Fall
cover - "Information Trails"
Choosing Words Carefully: Language to Help Fight Islamic Terrorism, by Streusand and Tunnell
Standing Up the Information Operations Range, by Sabo
Developing Joint Information Operations Warriors, by Pickle
A Closer Look at Radical Islam: Interview with Joseph A. Butta, Jr., by Whisenhunt
The Role of the Suicide Terrorist in Information Operations, by Goldstein et al
Harmonizing Australian-US Electronic Warfare Requirements, by Beebe
Improving Intelligence Support to IO, by Plevell
The Zero Effect: The Impact of Network-Centric Warfare on Operational Planning, by Andrews
USAF Intelligence Training & IO Warrior Preparation: Interview With Colonel Scott A. Bethel, by Whisenhunt
The Implications Of Chaplaincy Involvement Within Information Operations, by Smith
Keeping It Safe and Protected: The Mobile User (Part II), by Collingwood

2006 Summer
cover - "Using Influence Space"
Blogs and Military Information Strategy, by Kinniburgh and Denning
Strategic Communication: Key Enabler for Elements of National Power, by Josten
Cyber Mobilization: A Growing Counterinsurgency Campaign, by Thomas
Twenty-Eight Articles: Fundamentals of Company-Level Counterinsurgency, by Kilcullen
Thinking About Second & Third Order Effects: A Sample (And Simple) Methodology, by Miller
The Role of Information Operations in Strategy, Conventional War and Low Intensity Conflict, by Thomé,

2006 Spring
cover - "Looking Downrange"
Countering Al Qaeda: An Interview with Dr. Rohan Gunaratna, interviewed by Whisenhunt
Incorporating Cultural Intelligence Into Joint Doctrine, by Coles
Designating Information Operations as the Joint Force’s Main Effort - What Do We Really Mean?, by Horowicz
Enabling Strategic Communication at the Combatant Commands, by Perkins and Scott
Methodology for Determining EW JMEM, by MacEslin
Philippine Information Operations During The Hukbalahap Counterinsurgency Campaign, by Bridgewater

2006 Winter
cover - "Public Affairs on the Battlefield"
Strategic Communications: An Expanded IO Role?, by Perkins
Man-hunting, Nexus Topography, Dark Networks and Small Worlds, by Dodson
Operational Implications of Public Affairs—Factors, Functions, and Challenges of the Information Battlefield, by Crotts
Applying the Principles of War to Information, by Rowe
Objectives in the Information Environment, by Romanych and Cordray
Elements of National Power—Need for a Capabilities Compendium, by Josten
Keeping it Safe and Protected: The Mobile User, by Collingwood

2005 Fall
cover
Strategic Communications: How to Make it Work?, by Ecklund
Counterpropaganda: An Important Capability for Joint Forces, by Cali and Romanych
Thoughts on the Application of Military Theory to Information Operations and Network Centric Warfare, by Heickerö
Operational Net Assessment: A Framework for Social Network Analysis, by Hannan
Using Decision Analysis to Increase Commanders’ Confidence for Employment of Computer Network Operations, by Butler, Deckro, and Weir
Tor: An Anonymous Routing Network for Covert On-line Operations, by Fraser, Raines, and Baldwin

2005 Summer
cover
Mapping the Information Environment, by Cordray and Romanych
Influence Operations: Integrated PSYOP Planning, by Szeredy
Human Factors: IO With a Personal Touch, by Goldstein

2005 Spring
cover - "Information Operations: Post 9/11"
Information Operations Doctrine and Non-state Conflict: Shaping the Information Environment to Fight Terrorism and Insurgencies, by Emery, Mowles, and Werchan
A Theory-Based View of IO, by Romanych
Attaining and Maintaining National Security Advantage: Information Operations and Secrecy, by Miller
IO MOE Development and Collection: A Paradigm Shift, by Gray and Howard
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The following objectives are impossible without tricking the public into thinking illegal bills like CISPA are legal:

Stanford University Persuasive Technology Lab
http://www.au.af.mil/info-ops/influence.htm

The Stanford Persuasive Technology Lab creates insight into how computing products — from websites to mobile phone software — can be designed to change what people believe and what they do. "Yes, this can be a scary topic: machines designed to influence human beliefs and behaviors. But there's good news. We believe that much like human persuaders, persuasive interactive technologies can bring about positive changes in many domains, including health, business, safety, and education. With such ends in mind, we are creating a body of expertise in the design, theory, and analysis of persuasive technologies, an area called “captology.”

Machines Designed to Change Humans
http://captology.stanford.edu/

The Stanford Persuasive Technology Lab creates insight into how computing products

from websites to mobile phone software

can be designed to change
what people believe
and
what they do.

Yes, this can be a scary topic: machines designed to influence human beliefs and behaviors. But there's good news. We believe that much like human persuaders, persuasive technologies can bring about positive changes in many domains, including health, business, safety, and education. We also believe that new advances in technology can help promote world peace in 30 years. With such positive ends in mind, we are creating a body of expertise in the design, theory, and analysis of persuasive technologies, an area called “captology.”

By arriving at this page, you've reached the main website for our research lab, directed by Dr. BJ Fogg. On this site you'll find an overview of captology, learn about examples, have access to captology resources, and be invited to receive our lab's free newsletter. We also share some insights in our blog, Captology Notebook.

If you want to watch persuasive technology in action, go to Captology TV. This site has dozens of short videos showing how companies use the web today to influence people's thoughts and behaviors.


~~~~~~~~~~~~~~~~~~


An overview of captology

Captology is the study of computers as persuasive technologies. This includes the design, research, and analysis of interactive computing products created for the purpose of changing people's attitudes or behaviors.


As the graphic shows, captology describes the area where computing technology and persuasion overlap.

This area continues to grow quickly. Each week more computing products, including websites, are designed to change what people think and do. We expect this trend to continue, especially as mobile phones become more capable of running software from third parties and the Internet.
Captology is global

Beginning at Stanford in the 1990s, the study of persuasive technology is now a global area of research and design. In the early days, we were doing research, conducting classes, and organizing events at Stanford. But we did not organize the first global conference. We appreciate our colleagues at the Eindhoven University of Technology for organizing this in 2006: First International Conference on Persuasive Technology for Human Well-Being. Since then, the conference has been an annual event, bringing together researchers and practitioners from around the world:

Stanford University hosted the 2007 International Conference on Persuasive Technology.

Oulu University and Aalborg University hosted the 2008 International Conference on Persuasive Technology.

Claremont College will host the 2009 International Conference on Persuasive Technology.
Learn more about persuasive technology

People often ask how they can learn more about captology. First of all, read the material on this website. After that, check out some of the items below:
Read the book Persuasive Technology: Using Computers to Change What We Think and Do.

Read the book Mobile Persuasion, mentioned previously.

See the website of BJ Fogg, who is our lab's founder and director.

Sign up for the free newsletter from our lab.


You'll also find more of our lab's work at another website, which specializes in Web credibility. At our credibility site you'll learn what leads people to trust &mdash or not trust &mdash what they find online. This includes our 10 Credibility Guidelines for enhancing online trust and a report on a large web credibility study, done in collaboration with Consumers Union.

You can also learn about captology by reading our older topic papers on an archived version of our lab's website. Warning: The link above will take you to an old site. Some of these papers are still insightful, but please understand that some content is out of date.
Contact us

If you need more information, contact Dr. BJ Fogg. Our team tries to be as helpful as our time allows.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
http://www.au.af.mil/info-ops/influence.htm

It is a fundamental mistake to see the enemy as a set of targets. The enemy in war is a group of people. Some of them will have to be killed. Others will have to be captured or driven into hiding. The overwhelming majority, however, have to be persuaded.
--- Frederick Kagan, "War and Aftermath," Policy Review, Aug 03 [Everyone should be familiar with the Kagan family of f**ktards that influenced PNAC and AEI!]

Trying to get people to reason in a way that is not natural for them is like trying to teach a pig to sing. You don't accomplish anything and you annoy the pig.
--- E. Jeffrey Conklin & William Weil

Public sentiment is everything. With public sentiment nothing can fail; without it nothing can succeed. He who molds public sentiment goes deeper than he who enacts statutes or pronounces decisions. He makes statutes or decisions possible or impossible to execute.
--- President Abraham Lincoln

One cannot wage war under present conditions without the support of public opinion, which is tremendously molded by the press and other forms of propaganda.
--- General Douglas MacArthur

The real target in war is the mind of the enemy commander, not the bodies of his troops.
--- Captain Sir Basil Liddell Hart, Thoughts on War, 1944

The printing press is the greatest weapon in the armoury of the modern commander.... In Asia we were so weak physically that we could not let the metaphysical weapon rust unused.
--- T.E. Lawrence

All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident.
--- Arthur Schopenhauer

If a man will begin with certainties, he shall end in doubts. But if he will be content to begin with doubts he shall end in certainties.
--- Francis Bacon

Definitions
from AFDD 2-5

Influence operations are focused on affecting the perceptions and behaviors of leaders, groups, or entire populations. Influence operations employ capabilities to affect behaviors, protect operations, communicate commander’s intent, and project accurate information to achieve desired effects across the cognitive domain. These effects should result in differing behavior or a change in the adversary’s decision cycle, which aligns with the commander’s objectives. The military capabilities of influence operations are psychological operations (PSYOP), military deception (MILDEC), operations security (OPSEC), counterintelligence (CI) operations, counterpropaganda operations and public affairs (PA) operations. Public affairs, while a component of influence operations, is predicated on its ability to project truthful information to a variety of audiences.

These activities of influence operations allow the commander to prepare and shape the operational battlespace by conveying selected information and indicators to target audiences, shaping the perceptions of decision-makers, securing critical friendly information, defending against sabotage, protecting against espionage, gathering intelligence, and communicating selected information about military activities to the global audience.


Comprehensive Assessment of Department of Defense Human Factors Analysis (HFA) Methodologies - Statement of Work
Director of Central Intelligence Directive (DCID) 7/3 defines HFA as, “The psychological, cultural, behavioral, and other human attributes that influence decision-making, the flow of information, and the interpretation of information by individuals and groups at any level in any state or organization.”
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
More reasons for illegal CISPA bullshit:

Read all of this:


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

www.dodccrp.org/events/6th_ICCRTS/Tracks/Papers/Track2/049_tr2.pdf


Application of Network Centric Warfare Concepts to a Land-Air System – an
experimentation approach

Robert Seymour, Daphne G. Sands, Anne-Marie Grisogono, Mark Unewisse, Jon Vaughan
and Ron Baumgart
Land Operations Division
Defence Science and Technology Organisation
PO Box 1500 Salisbury, South Australia 5108, Australia
Phone: 61 8 82596563
Email: bob.seymour@dsto.defence.gov.au
Abstract
This paper describes the development of concepts for a military system of systems comprising a
variety of land and air assets integrated via network centric technologies and appropriate
procedures. A methodology is being applied which aims to coevolve the technology and human
aspects of the system of systems. The methodology features synthetic environment based
experimentation with a system concept demonstrator, which is constructed from an appropriate
mix of simulations, real hardware and software, and humans in key decision making roles. The
problem issues and chosen metrics and scenarios determine the fidelities of the representations of
the components of the concept demonstrator. This paper illustrates this approach with reference
to Exercise Prowling Pegasus, a synthetic environment experiment, which was a stage in the spiral
development process implicit in the methodology.
1 Introduction
In an attempt to demonstrate that the coordination and synchronisation of force elements of a
Land-Air System-of-systems (LAS) could be effectively achieved with the use of Network Centric
Warfare (NCW) concepts, we have constructed a system concept demonstrator (SCD) and
exercised this in a Synthetic Environment (SE). The LAS is a synergism of platform components,
C4ISR technologies and the people and procedures. Traditionally the formation, tasking and
command and control (C2) of Battlegroups, such as the LAS, has been accomplished by following
standardised procedures involving hierarchical lines of command and communication. This
process can lead to large time delays between task initiation and required effect and also can
impose a lot of rigidity to the mission plans. As a consequence, air strike missions in support of
land operations, for example, are not very responsive and tend to be restricted to targets with
fixed location. There is considerable potential for NCW technology to change this situation but
any introduction of technology must be accompanied by the development of new procedures and
operational doctrine. We have previously described (ref 1) a system-of-systems (SoS)
development and evaluation methodology, which is a combination of system architecting,Page 2

Operations Analysis and iterative experimentation using synthetic environments. This
methodology involves the development of a SCD and immersion of this in a SE, in order to
develop, refine and evaluate concepts of operations and tactics, techniques and procedures
(TTPs) exploiting the new features of the SCD. The SCD needs to be a suitable mix of models
and simulations, real hardware and software, human players, organisations, and procedures.
Representation of the various components of the SoS in the SCD is ideally determined by the
sensitivity of the overall metrics to the fidelity of the representation, but availability, feasibility and
cost of possible representations will also be major factors. The SoS representation is also
influenced by the issues chosen for study and the scenarios developed to address these. Due to the
difficulty in modelling complex human decision processes and the major part these will play in the
Land-Air SoS, key decision-making roles in the SoS are played by real people. This requires some
realistic representative interfaces between the humans and the rest of the experiment such as
existing or prototype Command Support Systems. A further aspect of the SCD is the interfaces to
the interaction environment, which need to be realistic enough to adequately represent the flow of
information between the SCD and the environment, but also allow access for measurement of
parameters of the system during the experiment for construction of the various metrics required
for the system analysis.
We have just completed a SE based experiment called Prowling Pegasus which aimed to assist the
development of a Land Air system concept for the Australian Defence Force. This paper describes
Prowling Pegasus against the framework provided by the methodology of reference 1. Some
results from a first analysis of the experimental data are presented and conclusions drawn as to the
potential benefits of Network Centric technologies and procedures to the Land Air system.
Further insights into the conduct of SE based experiments were gained and these are discussed.
2 Methodology
The methodology described in reference 1 is essentially an iterative development process whereby
a demonstrator of a SoS is constructed, experimented with and then modified in order to coevolve
the technology and human procedural aspects of the SoS. The aim is to produce the SoS
synergies such that, as a penultimate step in the process, an evaluation can be made of the true
value of a new SoS rather than of an assemblage of new components with old procedures. What is
different about our methodology is the potential to rapidly accelerate the coevolution process and
to significantly reduce the overall cost. This is achieved by a combination of the use of a SE to
represent most of the own and all of the enemy force in the conflict environment and, the
integration into this SE of a SoS concept demonstrator. The use of real humans immersed in the
SE is a vital part of the methodology as it is these that make the major contribution to the
development of new procedures better suited to the NC technologies so as to elicit the SoS
emergent behaviour.
In reference 1 the methodology was described as consisting of four phases. This paper is
concerned with the first three of these and the application to the Land Air System concept
development. In summary, the methodology consists of:
Phase 1. Problem definition and development of:Page 3

− Issues
− System of systems concept to address issues
− System of systems architecture
− Metrics of system’s ability to satisfy issues
− Scenarios to provide context and stress ability of system to satisfy
issues
Phase 2. Development of system of systems concept demonstrator (SCD)
− with fidelities of component representations chosen on the basis of
sensitivity of chosen metrics
Phase 3. Immersion of SCD in synthetic environment
− with play-out of scenario
− collection of data and analysis to populate measures of effectiveness
− feedback to modification of system concept
Phase 4. System of systems robustness.
− Model SoS in lower fidelity wargame (Janus or CASTFOREM)
− Evaluate against same metrics but in a variety of different scenarios
− Feedback to refine system concept and further iteration of development
cycle.
3 Problem definition and metrics
The problem addressed in the Prowling Pegasus experiment was the formation and command and
control of a BattleGroup (BG) with significant aviation capabilities working in a coordinated
fashion with some specific ground elements. The resulting SoS is what we call the Land Air
system-of-systems (reference 2). The hypothesis to be tested was that Network Centric
technologies and appropriate procedures would increase the effectiveness of the LAS and possibly
enable new SoS capabilities. To test this hypothesis the technical aspects of the system had to be
designed and appropriate procedures developed. The basic concept was that all members of the
BG could share information on blue force positions, status and mission plans and, detected red
force positions, status and projected red course of action. All this would be presented in a visually
intuitive way (3d presentation) superimposed on a representation of the terrain such as to enable
shared situation awareness, enhance decision-making, facilitate communication of commander’s
intent and orders and allow real-time mission monitoring.


The sharing of information digitally
would be augmented by voice communication to better assist knowledge generation and sharing.
A representation of the LAS concept is given in Figure 1, which is an OV-2 product in the
notation of the US DoD C4ISR Architectural Framework (ref 3) and produced with the Ptech
tool (ref 4). However the SoS also involves the human aspects of cognition and decision-making
together with procedures developed to extract the potential benefits of the technology.

An initial
set of new procedures was developed in a separate seminar involving both military and technical
experts and the intent was to develop these during the Prowling Pegasus experiment and in later
iterations.Page 4

Figure 1. Node connectivity of the Land Air System concept (OV-2)
As mentioned above, metrics are important to several aspects of the methodology. A hierarchy of
measures has been developed for the LAS development following the guidance given by the
Military Operations Research Society (ref 5). This hierarchy is described in table 1. At the highest
level, Measures of Force Effectiveness, MoFEs, provide a measure of how well the overall
mission intent was satisfied. Such measures are necessarily scenario specific and can be derived
from analysis of the articulated intent. As an example of such an analysis, the scenario for
Prowling Pegasus required the blue force to expel an enemy force from a town and to destroy
them in detail outside the town. Implicit in this intent is a requirement to minimise civilian
casualties and collateral damage in the town and to prevent the enemy from continuing to fight
once removed from the town. A total of three MoFEs can be shown to address both the stated
and implied intent. These are: total time to expel all enemy from town; the time integral of enemy
capability in town; and the numbers of enemy destroyed outside the town reduced by (weighted)
1
numbers escaping and (weighted) numbers destroyed in the town. At this level (and all levels)
measures of cost are also required such that cost benefit analysis can be performed for capability
acquisition processes. The high level costs identified are; overall capital value of the force; losses
to force; civilian losses.
At the next level down are the MoEs describing the effectiveness of the LAS. In a similar way to
the higher level, the role of the LAS as articulated in the intent communicated to the LAS
BattleGroup commander is analysed and measures of effectiveness constructed. For the Prowling
Pegasus scenario, the role of the LAS was to locate and destroy prioritised enemy targets outside
1
With weightings assigned in accordance with subject matter expert judgement.Page 5

town. A simple measure is the number of targets destroyed which can be attributed to the LAS
either directly or through its target acquisition for a 3
rd
party shooter. This MoE is then the ratio
of numbers destroyed due to the LAS to the total numbers destroyed, with perhaps some
reduction due to the (weighted) numbers of assigned targets not destroyed. Costs at this level
include measures of: capital value of the LAS; losses to the LAS; fratricide due to LAS; civil
casualties due to LAS; and collateral damage due to LAS. There is also the possibility that the use
of the LAS could have an indirect effect on enemy tactics and hence influence the overall
operation as reflected in the MoFEs. Such possibilities underscore the importance of baselining
with and without new capabilities such that relative improvements can be assessed.
It is at the next level down that the impact of the Network Centric concepts begins to be apparent
and directly measurable. Aspects of the LAS that directly impact its effectiveness are rate of
targeting, and probability of kill. Rate of targeting involves the whole process of surveillance,
reconnaissance, target acquisition and target hand-off and all of these have the potential to be
significantly enhanced by NCW concepts. The Prowling Pegasus experiment essentially held the
probability of kill once targeted at a fixed level so the one MoE at this level that varied in the
experiment, is the rate of targeting. In comparison experiments, the knowledge of the enemy prior
to tasking of the LAS, is the same for all cases. Costs at this level are essentially the vulnerability
of the LAS and this is related to: knowledge of threats; tactics employed to avoid known and
potential threats; and risk accepted. All of these are also potentially affected by NCW concepts.
The measure of vulnerability at this level is the total time elements of the LAS were in range of
enemy weapons.
At the next level down the decomposition of the two higher-level measures (rate of targeting and
vulnerability), as mentioned above, is carried out and measures are applied to each aspect. The
breakdown at this level is into procedural components and the measures of performance (MoP)
are mostly times to complete each component (time to air, transit time, time to acquire,
engagement time, re-tasking time). Such breakdowns are different for each set of procedures
implemented and details for the different system configurations used in Prowling Pegasus will be
reported elsewhere. However simple time measurements are not appropriate to the breakdown of
vulnerability into the components as described above, and here a mix of quantitative measurement
(numbers of threats known) and subjective assessment (degree of risk accepted) is required. A
MoP for tactics might only be measurable in a comparison study and at the next higher level.
2
There are additional costs that need to be considered at this level which involve the human costs
of the procedures (numbers involved, degree of skill/training required).
The MoPs of the components of the SoS are arguably at a lower level than those for procedural
breakdown described above, although some technology insertions can very directly influence the
MoEs without changing the high-level procedures. It is here that it becomes important to analyse
the impact of both technology and procedural aspects on the MoEs and we have found it useful to
describe such impact in the form of an influence matrix where eventually it will be necessary to
quantify the elements of this matrix either by comparison experiments or subjective assessment by
subject matter experts. However there is also the (desired) complication in such analysis when
2
Aspects difficult to measure absolutely can usually be assessed in comparison studies where their effect is evident
in the next higher-level measure.Page 6

procedures are modified to harness the potential of new technology insertion to produce overall
system synergy and then the higher-level measure is the true guide to improvement. The SoS is
decomposed into components and MoPs for these are devised. The details for the various SoS
configurations used in Prowling Pegasus will be reported elsewhere, but in general the
decomposition was into force mix components (helicopters, UAVs, HQ elements), C4ISR
technologies (mission management system, Joint interoperability, situation awareness displays,
information management architecture and communications technology) and integrated procedures
(planning, reconnaissance cuing, 3
rd
party targeting). The impact of the procedural aspects at this
level are also best observed at the higher levels. MoPs of the force mix elements generally relate
to their impact at the higher levels (eg effectiveness of the helicopter for reconnaissance,
effectiveness of a HQ element in reducing time to air) and for the C4ISR technologies MoPs are
related to improved situation awareness and decision making, both of which are also higher level
issues. Costs associated with the technology need to be assessed and factors involved include
capital cost, training required and vulnerability (to attack or breakdown).
This analysis could be carried to further lower levels to examine the performance of the individual
system components. To do this the components would need to be represented to sufficient fidelity
to justify such detailed study. An area where this was attempted is in the information technology
applied to situation awareness displays, mission management and information management. Some
description of the concept demonstrator system that was constructed for Prowling Pegasus is
given below. Detailed measurements of the parameters of these systems were carried out and will
be reported in full elsewhere (ref 6) but a brief description is given below in section 7. A second
area that was investigated in detail were the procedural aspects of the SoS, and again this will be
described briefly below but reported fully elsewhere (ref 7).
benefit
cost
MoFE
Measure of achieving high level intent
Capital costs, force losses, civilian losses
MoE
1
Effectiveness of Land Air System
LAS related capital costs, force losses, civilian losses
MoE
2
Rate of targeting by LAS
LAS vulnerability
MoP
1
Times for procedural components
Human resource costs, risk accepted
MoP
2
Performance of system components
Capital costs, human resource costs
Dimensional
Parameters
Low level data directly measurable
from high fidelity representations
Table 1. The hierarchy of metrics used for Prowling Pegasus.
4 The Land Air System Concept Demonstrator
The LAS had several configurations involving mixes of platform components including fixed wing
strike aircraft (FA-18s), Armed Reconnaissance Helicopters (ARH), tactical unmanned aerial
vehicles (TUAV), ground-based air defence (GBAD), forward air controllers (FAC), and several
ground-based Land and Air HQ elements. The representation of these components in the SCD
consisted of virtual platforms and representation in constructive simulations. Real people werePage 7

used in key decision making roles, which included the pilots and crew of the ARH and fixed wing
aircraft, ground based forward air-controllers (FAC), and a variety of roles in both Army and Air
Force headquarters. Virtual cockpits for both rotary and fixed wing aircraft were used to allow
the pilots to interact with the simulated battle and terrain of the constructive simulations described
below. A summary description of these representations follows.
• Platform-based Mission simulators
o ARH
ƒ Day and night out-the-window views
ƒ Target Acquisition and Designation System (TADS) including low fidelity
NVG and FLIR type views, laser designation and ranging, and target selection
and lock-on for weapons
ƒ EWSP: radar warning, missile warning, laser warning, audible and visual
displays, and automatic dispensation of countermeasures
ƒ Moderate fidelity flight dynamics (6 degrees of freedom)
ƒ basic flight instruments including heads-up displays, multifunction stick, and
pedals
ƒ Customised SA display with moving map, north or heading-up, blues and
detected reds as either military symbols or icons, sensor fields-of-view, threat
domes, flightplans, waypoints, no-go zones etc.
ƒ Weapons (Hellfires, rockets, guns)
o Tactical UAVs
ƒ Simulated realtime sensor (TV, FLIR, NV) views for human operators can be
provided in ground station, HQ or on board another virtual platform such as
ARH
ƒ Interface for operator control of sensor look direction
ƒ Operator can laser range and designate from sensor view and handover target
to any response asset
ƒ Can execute planned mission by waypoints or segments, or dwell on station, or
by manual control by operator
ƒ Can add EW, comms and weapon payloads if required
o Fixed wing aircraft (FA-18)
ƒ Out the window views
ƒ Moderate fidelity flight dynamics
ƒ Basic flight instrumentation
All the force mix components of the system were linked in the knowledge sphere by a technology
concept demonstrator system, which enabled the application of NCW principles by allowing all
players to have unrestricted sharing of situation awareness together with an ability to engage in
collaborative planning and decision-making. This system, which we call LSAS (for land situation
awareness system), uses a concept of information sharing, the ‘infospace’ described in reference
8, which allows all users on the system to access and deposit information in a distributed database.
The human players in the experiment interact with this ‘infospace’ via a visualisation system,
developed in-house using Autometrics’ “Edge Development Option”, which displays battlespace
entities on a 3D terrain and allows computer aided route planning, threat assessment,Page 8

reconnaissance planning and mission rehearsal with 3D ‘fly-throughs’. Instances of the LSAS
were provided to all of the humans in the SCD and each was configured independently to suit the
particular task. The pilots of the virtual helicopters for instance used their LSAS for navigation,
display of mission profiles (as prepared pre-flight in the Aviation HQ), and situation awareness by
displaying positions of friendly force elements and detected enemy (with associated ‘threat domes’
if identified). Connectivity of the ‘infospace’ in the real world is restricted by the communications
technology available and our concept demonstrator uses simulation (ref 9) of the digital
communications links including line-of-sight limitations (although this was not available in time
for the experiment). Additionally, several voice communications channels were provided to allow
this form of communication to augment the digital and assist in knowledge generation and
sharing.
New procedures for the planning and conduct of the mission in the context of the NCW
technology were developed through seminars involving military and system specialists, and these
were further developed during the conduct of the Prowling Pegasus experiment. These
procedures and the analysis of them are discussed further below but more fully in reference 7.
5 The Synthetic Environment
The SCD of the Land-Air BG interacted with constructive simulations of the rest of the friendly
force and the enemy force. The ModSAF constructive simulation was used to represent the
additional Land components and the STAGE simulation was used for additional Air elements.
Detailed numerical models of radar surveillance assets were also included and the whole of the SE
was linked using DIS protocols. Specialised interfaces between DIS and the ‘infospace’ were
constructed (ref 10) to link the SCD into the SE. The information that was fed from the
constructive simulations included the positions and status of all the blue elements and positions
and status of the red elements as determined by the available surveillance assets. Where the
surveillance assets were modelling in ModSAF, automatic feeds of the detections were fed into
the ‘infospace’. For the virtual platforms, when a human detected and identified an entity through
the view into the virtual world, this needed to be manually entered into the ‘infospace’ via the
LSAS interface. The movements of blue entities in the constructive simulations were carried out
by human operators (LOCON) who would receive commands from the HQ either by voice or via
the LSAS, but usually a combination of both to facilitate the communication of intent. The red
entities were controlled by another human player who represented an enemy commander
(ENCON).
6 Experiment Construction
A scenario was developed which involved the LAS assisting a conventional mechanised Brigade
in an operation of expelling an occupying force from a town (Katherine in Australia’s Northern
Territory). The main task for the LAS was to find and destroy priority enemy targets outside the
town.Page 9

The physical layout of the SCD was as follows. The Brigade HQ was sited in a tent in an open
space at the DSTO site at Salisbury. This HQ was represented by a small staff of about five
military, which carried out the command and support functions of immediate planning and
airspace coordination. A similar number of scientific staff assisted the military in the operation of
several LSAS terminals, which aided the military functions and provided the situation awareness
as the scenarios were played out. The Brigade commander also had use of a large format
‘Smartboard’ which was linked to the LSAS. An Airforce element in the HQ operated the Air
command support system, Phoenix, which was linked into the simulations and displayed the blue
air entities and the red air entities detected by the radar models. All these air entities were also fed
into the ‘infospace’ and could be displayed on LSAS terminals if required. One LSAS terminal in
the HQ was configured to display both Air and Land entities together, representing a Joint
situation awareness picture. Also in the HQ was the TUAV controller who had access to a virtual
view from the constructive UAV in ModSAF. This operator was able to steer the sensor
directions of the UAV and had access to a LSAS terminal when required to enter the locations
and identifications of entities detected in the virtual view.
In a room nearby was the Aviation Regiment HQ, which carried out the ARH mission planning on
an LSAS terminal. Also at the Salisbury site and located at separate locations were LOCON,
ENCON, HICON and the two virtual ARH cockpits. ModSAF and the radar simulations were
also sited at Salisbury and LSAS terminals were provided to most of the Salisbury locations. The
virtual FA-18 cockpit, the STAGE wargame and a LSAS terminal were located at DSTO’s
Melbourne site. The Melbourne and Salisbury sites are 800km apart and were linked by landline,
which carried the DIS traffic for the simulations, the simulated digital links of the ‘infospace’ and
a simulation of the voice radio link between ground based Air HQ elements and the FAC to the
FA-18.
The experiment was conducted over four days in March 2001. Day 1 was devoted to familiarising
the military participants with the capabilities of the LSAS
3
and general briefing on the background
to the missions. On subsequent days different configurations of the LAS were used in similar
missions. Each mission lasted about 2 hours and was followed shortly afterwards by an after
action review. The four configurations used were:
1. Two ARH’s conducting search and destroy missions and networked to each other and the
ground based HQs.
2. ARHs coordinating with: Special Forces conducting close reconnaissance and target
designation; with GBAD for airspace control; and with a UAV for reconnaissance.
3. Fixed wing added, with the ARHs acting as forward air controllers
4. Same as previous, but with ARHs also carrying out an attack function.
7 Analysis
3
A single day was insufficient to provide enough training to the military participants to make them proficient
operators of the LSAS and auxiliary scientific staff that had received more extensive training provided the
necessary skill level.Page 10

A feature of SE based experimentation is the ability to collect data. The complete sequence of
events during a mission can be captured for later replay and analysis, but it is also possible for
certain data to be processed and displayed to analysts in near real time. Missions could also be
stopped and restarted to enable analysts to examine human factors issues, such as the state of
situation awareness of participants or reasons for particular decisions, by direct questioning of the
players. In Prowling Pegasus, several automatic data logging techniques were employed and these
included:
− DIS logger, which logged all the data circulating on the network from the constructive
and virtual simulations regarding entity positions and status;
− ‘Infospace’ record, which recorded all the information that was deposited in the
‘infospace’ ;
− voice traffic record;
− video of actions during the missions of the virtual cockpit and HQ functions.
Additionally, trained observers recorded the human processes that occurred with particular
emphasis on the use of the LSAS, the HQ procedures and LOCON.
A key part of the analysis was the use of after action reviews (AARs), which gathered the
opinions of subject matter experts on some of the human factors and TTP aspects of the system.
The AARs were conducted shortly after the completion of each mission and an attempt was made
to incorporate some results of first-cut analysis and replays of crucial segments of the missions
using ModSAF and the LSAS. The intent was to stimulate the subject matter experts involved in
the AAR to conduct their own analysis of the causes of decisions and actions that had significant
effects on the course of the missions. However for a variety of technical reasons, this was
unsuccessful. A further problem with the construct of the AARs was the that the higher level
metrics had not been sufficiently defined prior to the experiment so that the questions were
possibly not as relevant to these as could have been.
The data gathered is currently being processed to populate the various metrics discussed in
section 3.
8 Results
The experiment provided examples of Land-Air battlegroups with intra BG coordination and
synchronisation as well as external interactions facilitated by NCW technologies coupled with
appropriately aligned procedures. Tasking, mission planning and mission conduct were performed
collaboratively across the brigade and battlegroup using an advanced LSAS, which involved
visualisation and planning tools with an underlying information management structure. Previous
work (references 11 and 12) has provided strong qualitative evidence of the benefits of shared
situation awareness. The current work has applied the concept specifically to the LAS with a
concept demonstrator mission management system, and has attempted some quantitative
measures of effectiveness.
The benefits of shared situation awareness were evident in the enabling of collaborative planning
of the detailed ARH mission profiles, which impacted at the higher levels of MoEs of time to airPage 11

(and hence target acquisition time) and reduced vulnerability. However, careful baselining
experimentation would be required to quantify these impacts. We were able to gain some
assessment of improvements as the participants learnt from one mission to the next how to better
utilise the capability offered by the LSAS demonstrator.
The LSAS also impacted on the planning within the Brigade HQ by assisting the development of
shared situation awareness. Again the impact of this is evident at the higher levels of measures of
target acquisition rates and reduced vulnerability. How much the LSAS contributed to shared
situation awareness is the subject of a separate investigation and some techniques for assessment
of situation awareness were trailed in Prowling Pegasus (ref 6). An interesting contrast that
emerged was the relative ease of generating shared situation awareness within the brigade HQ as
compared with the difficulty of communicating the inherent understanding to the other HQ and
LOCON, neither of whom were collocated with the Brigade HQ. This was despite all having the
same information and the same visualisation available with the LSAS. It was readily apparent that
direct personal interaction was a major factor in rapid development of shared situation awareness
and this is to be further investigated. The shared situation awareness also had additional impact
through the enabling of procedures for synchronisation of air-space and cooperative
reconnaissance, target acquisition and engagement. Again the benefits were apparent at the higher
level of measures (targeting rates, vulnerability, fratricide) and again the relative benefits of
different aspects will require careful baselining and comparison experiments.
As alluded to above, the experiment gave only preliminary quantitative results on the benefits of
NCW concepts to effectiveness of a LAS due to lack of a baseline measure and only partial
development of appropriate procedures. The procedures that have been discussed, which were
introduced to take advantage of the networking technology, could have been made even more
effective if greater advantage of the potential of the LSAS had been appreciated and utilised by
the military participants. A particular example was that little or no use was made by the FA-18
pilots of the potential offered by an LSAS system as enabled by digital information links. A
combination of the short familiarisation period provided before the experiment and some
‘unfriendly’ aspects of the LSAS user interface (cluttered displays, clumsy information entry for
ARH pilots, for example), had detrimental effects on user acceptance of the technology. Many
advanced features of a LSAS which some participants identified during the experiment, have
already been developed but, due to time pressures, were not used due to a technical problem of
interfacing them to the SE. These problems will need to be remedied in future experiments.
A further problem with the validity of any quantitative measures was the design of the scenario.
Although it had much military credibility it was not specifically designed to stress the issues
relating to the effectiveness of the LAS and the NCW concepts. In particular, the enemy force
was too inferior to the blue force so the use of the LAS did not have a decisive effect on the
overall battle outcome. Thus any improvements to the overall mission effectiveness, due to the
application of the NCW principles in a LAS, will not be readily apparent at the highest levels.
Other problems, related to the fidelities of representations of components of the SoS, also lower
the validity of any quantitative results. Some examples are the inadequate representation of the
UAV and its interface to the human operator, the cut-down representation of the HQ structurePage 12

(with only token representation of the S2 cell for example), and the representations of the data
communications links. The issue of the inadequate representation of the communications
infrastructure (where all data links in the experiment were very high bandwidth) does have benefit
in helping to define the bandwidth requirement to achieve the shared situation awareness
necessary for the synchronisation and coordination procedures. The information passage in the
LSAS system was designed to minimise bandwidth requirements in the expectation that the Land
environment would be restrictive. The actual bandwidth required in the experiment will be
extracted in the analysis of data collected and will serve as a guide to separate development of a
communications infrastructure architecture to support the application of NCW concepts.
9 Conclusions
The major outcome from the Prowling Pegasus experiment has been the refinement of the LAS
concept in the development of procedures to harness the potential of the NCW technologies
employed. Many possible improvements to both technology and procedural aspects have been
discovered and will be implemented in further iterations. However the quantitative measures
obtained should not be used in any definitive way to argue the value of the particular LAS
configurations due to the several inadequacies noted of this particular experiment. Analysis of the
conduct of the experiment itself has affirmed the power of the methodology and most of the
inadequacies have resulted from not adhering strictly to the stated methodology.
10 References
1. R. Seymour, AM. Grisogono, M. Unewisse, D. Tailby, L. Rees and P. James, The Role of
Synthetic Environments in C4ISR Modelling and Simulation, paper 19, 5
th
International
Command and Control Research and Technology Symposium, Canberra, Oct., 2000.
2. M. H. Unewisse and L. M. L. Rees, Integrated Land Air Systems in the Digitised
Battlespace, Australian Battlespace Digitisation Symposium, Adelaide, July, 2000.
3. C4ISR architectures working group, C4ISR Architecture Framework Version 2.0,
Department of Defence, USA, 1997.

4. Ptech Inc., (http://www.ptechinc.com/) Using Framework – Ptech Framework 5.3 for
Windows, 1998. Also see: G. Kingston, P. Prekop, M. Chin, R. Jones, D. Kilpatrick and
P. Collier, “Applying Ptech Framework to Modelling Operational Architectures”,
Proceedings for Defence Operations Analysis Symposium (DOAS) Canberra, 16 – 17
March 2000.Page 13


5. Military Operations Research Society, see L. G. Bornman Jr, Command and Control
Measures of Effectiveness Handbook, (C2MOE Handbook), TRADOC Analysis Center,
(TRAC-TD-0393),1993.
6. M. Kardos and D. G. Sands, Behavioural Situation Awareness Measures and the Use of
Decision Support Tools during Exercise Prowling Pegasus, DSTO Technical Report, in
preparation.
7. G. Goodman and D. G. Sands, The Impact of New Visualisation and Management Tools
on Joint Procedures for the Land Air System, DSTO Technical Report, in preparation.
8. R. Seymour, B. Kirby, J. Krieg, D. Reid, and M. Unewisse, Achieving Interoperability
through an Information Management Architecture, paper 46, 5th International Command
and Control Research and Technology Symposium, Canberra, Oct., 2000.
9. J. Krieg, Simulating The Effect Of Radio Communications On Deployable Applications
Using DIS,
SimTecT2001 proceedings, (2001)
10. B. Kirby, J. Krieg, S. Fry, R. Seymour, M. Unewisse, D. Sands and W. Johnson, Interfacing
Constructive and Virtual Simulations to Battlespace Visualisation and Decision Support Aids,
SimTecT2000 proceedings, p51, (2000)
11. AM. Grisogono, J. Vaughan, W. I. Menadue, R. S. Seymour and M. Davies, Synthetic
environments in support of capability development: an armed reconnaissance helicopter
case study at Exercise Phoenix SimTecT 99, Melbourne, March 1999.
12. AM. Grisogono and R. S. Seymour, Implications for Concept of Operations of an Armed
Reconnaissance Helicopter arising from the Synthetic Environment demonstration at
Exercise Phoenix, LOD Client Report, 1999.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline jofortruth

  • Member
  • *****
  • Posts: 20,089
    • The Great Deception
The list of FOOLS and MINIONS who voted for this legislation in the HOUSE! 
http://clerk.house.gov/evs/2012/roll192.xml
Don't believe me. Look it up yourself!

Offline SUPREMEMASTER

  • Moderator
  • Member
  • *****
  • Posts: 1,830
  • Commander
    • http://www.activismoverdrive.comze.com
There is no compromise.

It's not constitutional.

It's censorship for malicious reasons.

Everyone must know.

And we know it's a means to the end of all mankind.
Automatic User Post Signature:
The message has to be put out in the right way.
Website Still Needs to be updated |ActivismOverDrive.comze.net|

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
FBI's control of the most powerful and criminal paedophile sharing network in the historyy of the world which provoked members to murder and rape children for over 2 years would be legal under CISPA...

Operation Delego: State Sponsored Child Porn and Paedophilia Network
Use of Patriot Act by FBI to Promote Rape, Torture, and Murder of Children
WTF?

They basically allowed thousands of people to molest children for over 2 years and then arrested only 72 of them?

Is this the same insanity as the gun running to Mexico?

Is the entire network actually a government controlled and managed operation?

Was this just another extortion operation where thousands are encouraged to commit crimes as part of gevernment profiling and then the ones who do not match us to an NWO task are arrested?

72 out of thousands?

Over 2 years?

I thought that they are stopping child porn, it almost seems as if they are collaborating, encouraging, and turning a blind eye.



Attorney General Eric Holder Announces Results of International Child Pornography Investigation at Operation Delego Press Conference
http://www.justice.gov/iso/opa/ag/speeches/2011/ag-speech-110803.html
Washington, D.C. ~ Wednesday, August 3, 2011

Today I’m pleased to be joined by several key leaders in the federal government’s fight to protect the most vulnerable among us – our children – from exploitation, violence, and sexual abuse: Secretary of Homeland Security, Janet Napolitano; Assistant Attorney General for the Criminal Division, Lanny Breuer; United States Attorney for the Western District of Louisiana, Stephanie Finley; and Director of U.S. Immigration and Customs Enforcement, John Morton.

We are here to announce the results, to date, of Operation Delego – a critical, and ongoing, investigation that was launched in December of 2009.  This operation targeted hundreds of individuals, in countries around the world, for their alleged participation in “Dreamboard” – a private, members-only online bulletin board that was created and operated to promote pedophilia, and to encourage the sexual abuse of very young children.

Utilizing sophisticated techniques in an attempt to avoid law enforcement detection, Dreamboard’s members allegedly traded graphic images and videos of adults molesting young children – often violently; and created a massive private library of images of child sexual abuse.  

The rules of Dreamboard were clear – and they encouraged, and incentivized, the creation of child pornography.  According to our indictments – in order to become part of the Dreamboard community, prospective members were required to upload pornography portraying children 12 years old or younger; once given access, participants had to continually upload images of child sexual abuse in order to maintain membership; the more content they provided, the more content they could access; and members who created and shared images and videos of themselves molesting children received elevated status – and greater access.

Some of the children featured in these images and videos were just infants.  And, in many cases, the children being victimized were in obvious, and intentional, pain – even “in distress and crying,” just as the rules for one area of the bulletin board mandated.

Dreamboard’s creators and members lived all over the world – but they allegedly were united by a disturbing belief that the sexual abuse of children is proper conduct that should not be criminalized; and some even referred to their own creation, dissemination, and collection of child pornography as a “hobby.”  To put it simply, we have charged that these individuals shared a dream – to create the preeminent online community for the promotion of child sexual exploitation.  But for the children they victimized, this was nothing short of a nightmare.

Needless to say, in the Justice Department’s work to combat child exploitation and abuse, the conduct alleged in the indictments unsealed today is unconscionable.  But, as a result of Operation Delego, I’m pleased to announce that 72 defendants have been charged.  As of this morning, 52 of them have been arrested.  And we are working with our partners and international counterparts to identify and apprehend the defendants who remain at large.

Operation Delego represents the largest prosecution in history of individuals who participated in an online child exploitation enterprise conceived and operated for the sole purpose of promoting child sexual abuse, disseminating child pornography, and evading law enforcement.  Already, 13 of those charged have pleaded guilty – and four individuals have received sentences of 20-30 years in prison.

This successful operation marks another step forward in our work to protect children across, and beyond, our country.  Not only does it build on the progress that has been made through the Department’s Project Safe Childhood initiative – and the results that we achieved through “Operation Nest Egg,” and “Operation Joint Hammer” in disrupting child pornography trafficking; it also reflects the fact that, exactly one year after the Department unveiled the National Strategy for Child Exploitation Prevention and Interdiction, our commitment to safeguarding our children – and to bringing criminals who exploit and abuse our kids to justice – has never been stronger.  And our efforts in this area have never been more aggressive, more collaborative, or more effective.

With this latest operation, we are calling on the public to be vigilant in protecting our children – and reporting criminal activity.  And – because Dreamboard members have been arrested on 5 continents, in 14 different countries – I believe we’re also sending a strong message to those who are willing to harm and exploit children, and who attempt to hide their activities from law enforcement.  We will find you.  We will stop you.  And we will bring you to justice.

Our nation’s fight to protect the rights, interests, and safety of children goes on, and it will continue to be a top priority.  I want to thank everyone involved in this Operation for their great work – and their continuing efforts.

And, now, I’d like to turn things over to Secretary [Janet] Napolitano.

FBI used the illegal Patriot Act to stalk young children with no oversight
http://www.rawstory.com/rs/2011/03/31/electronic-frontier-foundation-uncovers-patriot-act-abuses/
By Eric W. Dolan
Thursday, March 31st, 2011 -- 9:32 pm

The digital rights advocacy group Electronic Frontier Foundation (EFF) announced Thursday it had discovered violations stemming from the FBI's use of expiring provisions of the USA PATRIOT Act.

Documents obtained by the group as the result of pending Freedom of Information Act litigation suggest that abuses of surveillance powers granted by the PATRIOT Act had been flagged by the FBI.

Congress passed a bill in February that extended the roving wiretap, "lone wolf" and "library records" provisions of the PATRIOT Act until May 27. The three provisions allow authorities to conduct surveillance without identifying the person or location to be wiretapped, permit surveillance of "non-US" persons who are not affiliated with a terrorist group, and allow law enforcement to gain access to "any tangible thing" during investigations, respectively.

FBI Director Robert Mueller told members of the Senate Judiciary Committee on Wednesday that the three provisions should be made permanent. He also told the committee he was "not aware of any" abuses resulting from the provisions.

Among the heavily-redacted documents obtained by the EFF is a report [PDF] showing that the FBI monitored young children for five days, despite the fact that none of the voices being monitored matched the language of the target. The report concluded that the roving wiretap violation occurred as a result of an inadequate review of the wiretap renewal application.

The documents were obtained as part of the EFF's ongoing FOIA Litigation for Accountable Government (FLAG) Project.

Congress is expected to pass a longer extension of the three controversial provisions of the PATRIOT Act, but some senators have vowed to amend the legislation to ensure American's civil liberties are protected.

Senate Minority Whip Dick Durbin (D-IL) has proposed an amendment to the bill that would require the government to describe the target of a roving wiretap "with particularity."

"Roving wiretaps, which do not require the government to specify the place to be bugged, are designed to allow law enforcement to track targets who evade surveillance by frequently changing phones," he explained. "Before the PATRIOT Act, roving wiretaps were only permitted for criminal investigations."

"Unfortunately, the PATRIOT Act did not include sufficient checks to protect innocent Americans from unwarranted government surveillance," Sen. Durbin continued. "Under current law, the FBI is not required to ascertain the presence of the target of the wiretap at the place being wiretapped, as it is for criminal wiretaps."



THE ENTIRE BILL IS ILLEGAL, IT IS THE GREATEST ACT OF TERRORISM AGAINST THE AMERICAN PEOPLE SINCE THE ALIEN AND SEDITION ACT!

IT IS AN OPERATION RUN BY THE CFR/BILDERBERG TO ELIMINATE THE SOVEREIGNTY OF THE UNITED STATES OF AMERICA.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
SSI Exclusive: Hiding mass murder behind "national security."
What Newsweak & the FBI didn't want you to know about PATCON and the OKC Bombing.

http://sipseystreetirregulars.blogspot.com/2011/11/ssi-exclusive-hiding-mass-murder-behind.html
Thursday, November 24, 2011

And now we know what a cabal of New York editors under pressure from a frightened FBI and nervous White House can do to the story of the greatest crime ever perpetrated by the Federal Bureau of Investigation -- they can gut it, reducing it almost to innocuousness, all to protect criminals who hide behind federal badges and to shield the politicians who sent them.

For you see, you may scan this article, you may study it, you may even read it backwards, but you will find no mention of PATCON. Nor will you find any mention of how PATCON touched upon, shaped the lives of and ultimately decided the fate of the dead at Ruby Ridge, Waco and Oklahoma City. For PATCON has been excised by the editorship of Tina Brown and sent down the memory hole as if it never existed.

Sources in advance of the story said that FBI was very afraid of this article. "They don't want PATCON mentioned," said one source. "Not ever, by anybody. Because it leads to OKBOMB (the FBI name for the Oklahoma City bombing case), Elohim City (Oklahoma, a Christian Identity community), (German undercover agent Andreas Carl) Strassmeier, the McVeigh-Strassmeier connection, the Aryan Republican Army, the whole shebang." A source out west told me that when he mentioned the name to a retired FBI agent, he was told to "stay away from that shit" for "PATCON will get you killed -- it's national security."

There are many rumors and individual bits of fact that have drifted out about PATCON over the years -- Stories of FBI informants and undercover assets giving taxpayer-funded operational assistance -- including weapons, explosives and money -- to neoNazi and racist terrorists to cement their relationships with the criminals; Reports that an operation that began with real concerns about racist terrorist groups like The Order was expanded to include mere political opponents of the Clinton administration and the defensive-oriented constitutional militias; Reports of a similar operation called VAAPCON, "Violence Against Abortion Providers," using the same tactics; Reports that the Southern Poverty Law Center was hip-deep as a partner to the FBI in PATCON; Reports of FBI penetration of the news media, religious institutions and the ranks of politicians of both parties, who very usefully expanded the FBI's power and reach and who provided political cover when the curtain slipped. Oklahoma lawyer and journalist J.D. Cash once told me that "there isn't a neoNazi or racist group in the country that isn't operationally controlled by the FBI." Did that include the Aryan Republican Army and the Oklahoma City bombing? I asked. "Certainly," he replied. So, the prospect of a story in a major news magazine about PATCON must have given the FBI a severe case of the old rectal looseness.

Now, however, "the Fibbies in the Hoover Building, (Eric) Holder and (Janet) Napolitano must feel like dancing" said another source. "They got what they wanted out of Newsweek. . ."


So I wrote on Monday in this article which linked to a
published but gutted version of the original Newsweek story about the patriotic volunteer confidential informant John Matthews, who was recruited by the FBI under the secret program known as PATCON (Patriot Conspiracy).

"What was it, specifically," I was asked later in numerous emails and phone calls, "that Tina Brown cut out?" From sources I had a pretty good idea, not all of which I put in the first article. But that was only based on trusted but secondhand sources.

Well, now I can answer that question. Sipsey Street has obtained a copy of the unedited article written by R.M. Schneiderman.

It was -- as originally written -- a great story, an important, game-changing story, a story that couold have made the career and reputation of Ross Schneiderman for the rest of his life. It had been several months in the making, sources say, as Schneiderman and his immediate editor John Solomon put it together and almost instantly ran into resistance from editors higher up the Newsweek food chain including, ultimately, Tina Brown.

When the editors were finished, most of the startling revelations of what John Matthews and Jesse Trentadue had to say were in Tina Brown's waste basket. Nestled beside them, amid waste paper and used Starbucks' latte cups, was the golden opportunity of Ross Schneiderman's career.

However, sources tell Sipsey Street, that the FBI, the Obama DOJ and the White House were all reportedly quite happy -- as well they should be.

Until now.

(NOTE: The excerpts below contain typographical errors found in the original and I have left them as is.)

Among the items expunged from the story:

1. The missing paragraphs that presented evidence that Tom Posey, the supposed chief conspirator whose crazy talk about using weapons of mass destruction first prompted Matthews to go to the FBI, may himself have been a government asset. From the original story as written, before Tina Brown's felt tip marker excised it:

After Posey’s arrest, the FBI had Matthews Social Security number changed, and paid for him and his family to move to Stockton , California . Yet the trial in Alabama proved frustrating for him. Despite hundreds of hours of recorded conversations, as well as video and personal surveillance, the Justice Department only chose to prosecute Posey and his cohorts for buying and selling the stolen night vision goggles. And in the end, Posey was sentenced to just two years in prison.

A spokeswoman for the Justice Department in Birmingham said there simply wasn’t enough evidence to prosecute Posey for the Brown’s Ferry plot. Yet curiously, the TVA denied that the plot or the weapons cache even existed. Meanwhile, several of the men involved in the planned robbery were never arrested. At the time, two of the men, Matthews says, were planning to blow up a federal building in Birmingham .

“They were gonna take a truck filled with fertilizer,” says Matthews. “You look at what Timothy McVeigh done, it’s basically the same thing. “What happened in Oklahoma could have happened a couple of years earlier.”

One possible explanation for how Posey’s trial played out: In 1996, the year he was released from prison, Posey appears to have been issued a new Social Security number, according to a Lexis-Nexus search conducted by Newsweek. Tony Gooch, a friend and Posey’s and a former CMA member, said that Posey was innocent of any wrongdoing, and that the whole Brown’s Ferry plot had been cooked up by Matthews. “Tom was a good man,” he says. “John did not endear himself to us with that story.” Yet Gooch said that Posey may have felt forced to cut a deal with the Justice Department, and provide them with information on other groups in the movement, or agreed not to reveal what he knew about Iran Contra.

“It wouldn’t surprise me,” Gooch said. “Tom knew some people who were real hardcore.”



Andreas Carl Strassmeier. John Matthews encountered him in company with Timothy McVeigh in San Saba, Texas. Sources say that Strassmeier was a joint operative of the German and U.S. governments.

2. There is mention that Matthews had encountered both Timothy McVeigh and Andreas Carl Strassmeier, widely thought to have been involved in the planning of the bombing, in Texas. From the original version of the story:

In the spring of 1995, Matthews was sitting on the couch with his father at his house in Stockton California when he heard the news: A truck bomb had exploded in front of a federal building in Oklahoma . Dozens had been killed, hundreds had been injured and the face of the building looked like it had been chewed off by an animal with a giant maw.

Matthews watched the coverage of the bombing with rapt attention. After all, this was the same sort of attack he had spent years trying to prevent. Days later, when McVeigh became the prime suspect and his photo flashed across the screen, Matthews realized he had seen him before. His mind drifted back to a weekend several years prior at a ranch in San Saba , Texas , where once a month, the TRM held paramilitary training.

It was a relatively warm Saturday morning. Matthews, who had spent the night on the ranch, was walking back from the woods where he had been setting up the evening’s exercise, when he spotted a group of men in fatigues hanging around a shed where the TRM stored explosives. Some of them, Matthews could tell by their haircuts and bearing, were ex-military.

Matthews and a few of his cohorts walked over to the men and introduced themselves. One man had dark hair, slightly buck teeth and a foreign accent. His name was “Andy,” and Matthews later learned that he was from Germany . Another man was tall and lanky, with short, buzzed hair. He said his name was “Tim.”

“He [Tim] was a nobody,” Matthews says. “Just another ex-soldier, but I remember his face. He was at one of the meetings, where a bunch of [stolen] ammunition was brought in from Fort Hood .”

Sitting in father’s living room in California , watching the television, Matthews decided he should call Jarrett. He told them about “Tim” and “Andy the German.” Yet Jarrett seemed blasé about the matter. “He said, ‘We know, John. Don’t worry about it. We got it covered.”

Instead, he was more interested in whether Matthews had seen McVeigh in Arizona . At the time, Matthews was working for the bureau there, infiltrating militias and separatists, along with meth-cooking gangs of bikers. Apparently, Jarrett said, McVeigh had spent time with similar groups. But Matthews never ran across him in Arizona , he said. Only in Texas . Jarrett thanked him and said he’d keep him updated. But as Matthews recalls it, that was the last time they ever spoke about the bombing.

When the FBI and the Justice Department eventually determined that McVeigh had largely acted alone in the bombing, with minimal assistance from two men who eventually back out of the attack, Matthews was skeptical. He began to wonder if it wasn’t a repeat of the Brown’s Ferry incident all over again.

“I felt Don knew more about this, but he could never say something to me,” Matthews says.

Jarrett passed away in 2009. . .


3. The story published also excised any mention of the Texas Light Infantry, a militia unit in the Lone Star State which contained constitutional militia, racist right and non-political elements. The racists and neoNazis, says one source who was familiar with TLI at the time, "kept a very low profile. Think of them as infiltrators that most TLI members knew nothing about."

Exactly why Newsweek found it necessary to delete mention of the TLI get-together in San Saba, and instead ascribe it to the Texas Reserve Militia, is curious. It was the TLI which is mentioned in FBI reports (called 302s) of this meeting where Matthews met men who he later discovered to be McVeigh and Strassmeier, sources say. Why, sources ask, is Newsweek (and presumably the FBI) allergic to mention of TLI?

4. The published story also expunged mention of an FBI undercover operative named Dave Rossi.

In January 1992, Matthews and Posey traveled to Austin Texas to meet with Neal Payne, a member of the Texas Reserve Militia, an Austin-based paramilitary group. Years earlier, Payne, a chiropractor who had been married in a church in which swastikas were frequently displayed, had been arrested for harboring Louis Beam, then a fugitive former Klan leader, who was indicted on charges of trying to overthrow the government. (He was later acquitted). Now, the FBI was investigating Payne, Beam and the TRM for allegedly laundering money through a Texas gun shop, paying off local law enforcement, purchasing stolen weapons from a Texas military base, smuggling arms from Central America, attempting to blow up a National Guard convoy in Alabama and threatening to kill two FBI agents in response to Beam’s arrest.

It was evening when they met at a small hotel room, on the outskirts of the city. The weather was cold and the sky was darkening. It had rained earlier that day, and inside the hotel room, the smell of must lingered in the air. Portraits of cowboys hung on the walls, as did old photos of the Alamo . Payne had wanted Matthews and Posey to meet a friend of his, an Austin-based Vietnam veteran named Dave Rossi. Rossi was about average height and build. He sported a shock of silver hair, a gray moustache and a green bomber jacket, which was fashionable among skinheads at the time.

For the next few hours, they kicked back on the beds and in the chairs and talked about the movement, how if they were ever going to stop the Jewish-led New World Order, they would have to band together, trading knowledge and weapons and making sure the government didn’t infiltrate them in the process. Fashioning his group after the Order, an infamous white supremacist gang of bank robbers from the 1980s, Rossi told Matthews and Posey that he and his cohorts were robbing armored cars, and using the proceeds to fund the movement. “He let us know that there was money available,” says Matthews. “We were feeling each other out.”

Posey, on his part, touted his access to weapons, and his history with the Contras. And as they left the hotel and drove to a local restaurant for dinner, Posey said could supply Rossi with C-4, a military grade explosive, as well as Stinger missiles, deadly heat-seeking devices, which when strapped to your shoulder, can bring down an aircraft with one shot.

Matthews recalls Posey leaving the meeting and feeling good about the future of the movement. “We really didn’t know where we were going with it at the time,” Matthews says. “But if they showed up with money then we could believe what they were telling us.”

In September of 1992, on a brisk morning in Benton , Tennessee , Matthews met Rossi and Posey at the annual convention of the American Pistol and Rifle Association, a gun rights group to the right of the NRA. Guards dressed in a camouflage uniforms, and armed with semi-automatic pistols patrolled the compound. Children and adults fired pistols and rifles at targets shaped like police cars a nearby range, and later, the group’s head of security, a police officer, taught a class on how to disarm law enforcement officials and kill them with their own guns.

As the day progressed, Matthews did his best to keep his distance from the undercover agent. For months, he and Posey had been travelling across the country, meeting a who’s who in the movement—from the Klan to the Aryan Nations--and linking them up with Rossi. Each time, Rossi introduced himself as a leader of a gang of armored car robbers with lots of money on his hands and a desire to fund the movement.

Eventually, however, Matthews began to wonder: If this guy has all this cash at his disposal, and he’s robbing all these banks, why haven’t I heard about the robberies? Matthews asked Jarrett and several of his other handlers at the bureau and they demurred. But eventually, after Matthews continued harping on the issue, Jarrett admitted what Matthews had begun to suspect: That Rossi was an undercover agent, posing as the leader of a white supremacist group. And the hotel they had initially met at in Texas had been bugged.

At first, Matthews felt betrayed; it was as if the bureau didn’t trust him. But then the knowledge that Rossi had been with him along the way was validating; Jarrett told him that he had earned their trust, and so Matthews continued his work, knowing that his handlers were behind him. Now, when they arrived on a scene, they often split up and had separate targets.

Matthews’ job for the weekend was to film. And that evening, as roughly 150 men and women—many of them in flannel shirts and baseball caps--gathered into an old barn to listen various speakers, Matthews sat in the back with the video camera rolling, while Posey and Rossi sat nearby, chatting amicably.

One speaker, a burly man with silver hair and a commanding Southern drawl drew considerable applause as he excoriated then President George H.W. Bush, and his opponent, Arkansas Governor Bill Clinton.

“It is no longer the lesser of two evils, but the evil of two lesser that threatens the United States of America today!” the man said. “We have more of a good reason for a second American revolution than ever before.”

The speaker, James Gordon “Bo” Gritz, was the leading candidate for the extreme right wing Populist Party in the 1992 election. Four years earlier he had been on the party’s ticket as the running mate of former Klan leader David Duke. In recent months, Gritz had been in the headlines for his role in trying to negotiate an 18-month standoff between federal agents and Randy Weaver, a right-wing Christian fundamentalist and former ATF informant, who had links to the Aryan Nation. The standoff ended after an FBI sniper, who was authorized to use lethal force, shot and kicked Weaver’s wife Vicki, who was holding her new-born child.

The news quickly galvanized the radical right like never before. Men like Posey—who already worried that their right to bear arms was eroding--suddenly feared that the government would soon come for them, too. And while months prior, various white supremacists, Neo-Nazis and anti-government groups had talked about joining forces, after the Weaver shooting, that talk quickly turned to action.

The audience stood and applauded as Gritz decried the bureau’s handling of the Weaver standoff. And after Gritz’s speech ended, Matthews, Rossi and Posey slipped out of the back of the barn and walked through the grass over to where Posey had parked his blue Ford Bronco. For months they had been trying to hash out a weapons deal. Posey had told Rossi that he could get him as many as six Stinger missiles, priced at $40,000 a piece. The FBI had allocated the money for the purchase, apparently not to bust Posey, but to further embed the undercover into the world of hate and extremism. Days before the sale was to take place, however, Posey said he had sold the missiles to a group in Minnesota for $45,000 a piece, though it’s not clear if he was telling the truth.

That evening in Tennessee , however, Posey had several pairs of military night-vision goggles in his SUV. All were in green canvas cases and the serial numbers had been removed. Rossi tried out several pairs of goggles, and they worked. He then pulled out $7,500 in cash and handed it to Posey. Before they parted that evening, Rossi asked Posey when he could get more goggles, and where they came from. Posey said he’d have them in about a week along with some TNT and C-4 explosives. The goggles, he said, came from “the black market.”


Rossi, my sources say, may have been the ultimate PATCON operative, serving the FBI in a number of operations. If true, it is understandable that the FBI would be happy that Rossi's role ended up in Tina Brown's waste basket.


The body of Baylee Almon is carried from the wreckage of the Murrah Federal Building.

5. Also excised was mention that Jesse Trentadue had more than just a suspicion that his brother Kenney had been beaten to death as part of the OKBOMB investigation:

After his latest stint in the emergency room this year, Matthews says he kept thinking more and more about what his family knew about him and what he sacrificed over the years. Wondering if anyone had ever tied his name to the FBI, at a whim that morning this past summer, he began searching around online.

What he found was an article about Trentadue, the Salt Lake City attorney. For the past 15 years, the West Virginia-born lawyer has been shuffling across the street from his office in downtown Salt Lake City , and filing profanity-laced letters and Freedom of Information Act Requests to various federal agencies.

His goal? To prove that the agency killed his brother, Kenney, during a botched interrogation at the Oklahoma City Federal Transfer Center in 1995, shortly after McVeigh’s attack. The bureau claims Kenney hung himself in his cell, but Trentadue says--and provided pictures indicating—that Kenney’s throat was slit and his body was covered in bruises.

Trentadue and his family were awarded $1.1 million for emotional distress after a federal judge found that the FBI and Bureau of Prisons had lied in court and destroyed evidence during the investigation. But Trentadue wasn’t satisfied. And not long after, he received an anonymous phone call from someone who said that his brother had been killed in a case of mistaken identity. The FBI, the caller said, believed that Kenney was actually a member of the Aryan Republican Army, a notorious gang of white supremacist bandits who robbed 22 banks across the Midwest in the early to mid ‘90s.


6. Gone, too, were the links between McVeigh and Strassmeier:

For years the FBI has insisted that McVeigh was essentially a lone wolf terrorist. Yet through his FOIA requests, Trentadue learned that the bureau had long possessed evidence linking McVeigh to the ARA, and several of the gang’s members to the bombing in Oklahoma City .

As Matthews read on he ran across a name that stopped him cold: Andy Strassmeir. A mysterious German national, a member of the country’s army and son of an advisor to Helmut Kohl, the former German chancellor, Strassmeir moved to the U.S. in the late 1980s. Over the next few years, he began palling around with ARA members and other white supremacists in Oklahoma . But according to the FBI files released by Trentadue, Strassmeir also conducted paramilitary training with the TRM in Texas . And Matthews believes he is the same man that he encountered, along with McVeigh, in San Saba.

In an interview with Newsweek, Strassmeir said he had indeed trained with the TRM, but he did not recall training with McVeigh. Instead, he said that he and McVeigh had only met once at a gun show in Tulsa , Oklahoma in the spring of 1993—a meeting that McVeigh confirmed before he was put to death roughly a decade ago.

In an interview with Newsweek, Strassmeir said that he and McVeigh had never been friends. Phone records discovered by the FBI show that McVeigh called Strassmeir two weeks before the bombing. The German-native says he wasn’t home, and has no idea why McVeigh was calling. Roughly a year later, he slipped out of the country through Mexico , after a private investigator working for McVeigh’s defense attorney attempted to have him summoned to court. He had never been interviewed by the FBI until he was already safe and sound in Germany .

Speaking by way of phone from Berlin , Strassmeir told Newsweek that he was neither an informant nor a conspirator in the Oklahoma City bombing. A FOIA by Trentadue sent to the CIA about Strassmeir came up with 26 documents. Yet the National Geospatial Agency, part of the Department of Defense, would not allow Langley to release the documents, citing national security concerns.



Chase and Colton Smith. Collateral damage to the unintended consequences of PATCON, 19 April 1995. They would be young men now if not for McVeigh and Strassmeier. They never got the chance.

There is one thing that the heavily-edited article did, however, which makes these edits so much more important now that we know about them.

Both the FBI and Newsweek have validated Mr. Matthews service, his accounts and the quality of his memory. From the FBI plaque given to John Matthews:

“John W. Matthews: In appreciation and recognition for your outstanding efforts in assisting the FBI to combat domestic terrorism throughout the United States : March 28, 1991 – May 30, 1998.”


And Newsweek added this paragraph:

Matthews' story, which Newsweek verified through hundreds of FBI documents and several dozen interviews, including conversations with current and former FBI officials, offers a rare glimpse into the murky world of domestic intelligence, and the bureau's struggles to combat right-wing extremism.


When you take the gutted version of the story and combine it with the critical information Tina Brown cut out and then compare it to these glowing character references, there is one thing that leaps out at any independent observer -- the full truth about the FBI's involvement in, and prior knowledge of, the Oklahoma City bombing has yet to be even scratched.

John Matthews, a dying man, a patriotic man, a man who tried above all to do right and protect the country that he swore an oath to protect against enemies foreign and domestic, has come forward to tell his story.

Then let him tell the WHOLE story about PATCON.

The cause of simple justice for the victims of Oklahoma City demands it.

Newsweek is evidently so compromised by political considerations that it cannot tell these truths.

It remains to be seen if there are any other "mainstream media" outlets who can, or will.

But at least, gentle readers, you know now the extent of Newsweek's perfidy in hiding the truth that threatens both the comfortable bureaucratic existence of the FBI and the reputations of people such as Eric Holder and Janet Napolitano -- both of whom were knee deep in PATCON and the cover-up of the true circumstances behind the deaths of 176 men, women and children in Oklahoma City on 19 April 1995.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The Cybernetic Conspiracy Exposed
These Corporations Write the Bills that are Destroying America,
Aiding and Abedding the Enemy of the United States,
Giving Comfort to the Terrorists who want to Kill Us,
and are a Clear and Present Danger to National Security

Conference lectures and keynote speeches by Dr Patrick Dixon
http://www.globalchange.com/pptindex.htm

Keynote for 350 global team of MTN - telcos, consumers and emerging markets

Select from list below of more than 200 recent presentations and keynote speeches by Dr Patrick Dixon for multinational companies. You can also watch 250 video clips. This page is for clients and for those interested in booking lectures. No static slides or videos can do justice to large-scale multimedia 2D or 3D events, which have more in common with the experience of theatre - interactive, dynamic, provocative and entertaining as well as profoundly challenging and often disturbing. Dr Dixon is often described in the world's media as Europe's leading Futurist and has been ranked as one of the 20 most influential business thinkers alive today (Thinkers50 2005 survey).

Style and content of presentations varies hugely with size of audience, nationalities present, audience interests, corporate in-house seminar, client event or business school classroom. Each multimedia package is created in a unique process, in close consultation with event organisers, and is delivered in an entertaining and interactive way. See information for event organisers including 3D Journey to the Future.

Presentations slides:

(scroll down page for 200 videos)

Convergence - impact on future world.  Digital technology, biotech, nanotech, broadcasting, phones, entertainment and many other parts of our world are converging in new ways.  Expect new industries, innovations and consumer choices.  Keynote presentation for industrial and research leaders in South Korea.

Future of Manufacturing - Business Week / Siemens client event in Boston for manufacturing industry analysts.  New markets and technologies in manufacturing.  Impact of credit crunch.  Nanotechnology and biotechnology, future of the pharmaceutical industry and space technology.  Divergence and convergence.  Impact of global warming, energy costs and worries about sustainability / climate change.  Outsourcing, offshoring trends reversal, emerging markets as consumers and manufacturers.  Innovation in manufacturing.  Listen to i-pod audio and watch slides.

Credit Crunch, Economic Crisis and Possible Recession - Managing Uncertainty - Leadership Strategies.  Client event for HR directors and Finance directors of large multinationals (for Hewitt).  How to survive the credit crunch.  making sense of confusing radar signals. Focus on what matters.  Managing risk. Seizing opportunity with agile leadership, scenario planning, dynamic strategy and bold cost cutting - reshaping for future growth.  Longer term outlook for global economy. Credit crunch rescue package explained.  How to motivate teams through the crisis - engagement with passion and purpose.  Keys to keeping teams together and strong during rapid mergers and acquisitions.  See also videos on credit crunch impact for business and leadership strategy and videos on banking trends.  Also videos on risk management and leadership" target="_blank">leadership videos.

Future of Fast Moving Consumer Goods.  Household goods, food and drink trends - for The Leading Edge Strategy Group client event in London.  Impact of recession on household demand, wholesale, manufacturing and retail.  Managing risk and seizing opportunity in fast moving consumer good sector (FMCG).  Changes in consumer behavior and mood.  Impact of global warming and climate change concerns.

Future of Satellites, Broadband, Communications and Mobile Phones.  Client event for SSL (Loral) in San Francisco on satellite industry trends in manufacturing, servicing, launch, space communications, mobile phone networks, broadband, mobile internet, video on demand, video streaming and the future of the internet.  Global online bandwidth forecasts and impact of high definition TV on satellite bandwidth demand.  Commercialisation of space.  New satellite technologies and capacity forecasts.  Future of geosynchronous satellites and low orbit satellites - in meeting demand in mature markets and emerging economies / Africa, Asia and Latin America.

Future of the Pharmaceutical Industry and Health Care Trends - for ICPM - medical directors of research in Pharmaceutical companies on innovation, new patterns of health care, challenges in drug development and drug discovery. New regulations, government and insurance remuneration policies. Patient expectations and unmet needs.  Over the counter therapies and prescription only treatments.  Health care costs, patents, generics and manufacturing, patient safety and future of clinical trials.

Leadership in an Uncertain World - European School of Management and Technology.  Challenges and opportunities - Six Faces of Global Change and what they mean for your business.  Keys to success in downturn and beyond.

Future of tourism, travel industry and hospitality sector - leisure and business trends. For Portuguese Tourist Board - impact on Portugal and wider region.

Future of the Energy Industry - for General Electric. Sustainable energy and other issues specific to clients of derivative gas turbines division.

Stan Am Rheim Leadership Forum 2008 - key global trends and impact on leadership / strategy following credit crunch and global economic chaos.  Managing uncertainty, reducing risk and maximising opportunity.  Credit crunch in broader context of global trends and economy.

Future of Conferencing and Corporate Events - 4,500 people watched this fast-moving, entertaining and provocative, multimedia opening keynote on a massive 80 foot by 20 foot screen - staged in the largest ballroom in the world (Las Vegas). Audience: members of MPI who are all involved in creating corporate events. Some slides only - video to follow soon. See also blog on future of conferencing and YouTube videos by Patrick Dixon.

Future of utilities: energy, water, phone - for clients of Black and Veatch - Santa Fe 2008. Sustainable leadership and climate change. Challenges and opportunities during current economic instability. How utility companies need to change to keep pace with future consumers and regulation.

Preventing Future Conflicts - with special reference to Asia Pacific. Keynote address for 500 US military (US Pacific Command senior leadership) and guests. Wide ranging presentation on global trends, impact on international tensions, ways to increase co-operation and understanding, and why new approaches will be needed in military strategy to be effective in building international peace, security and prosperity for all.

Future of the Paper, Cardboard and Packaging Industries - keynote conference opening sesssion for 1,500 people in Stockholm. Future of forestry, logistics, energy reduction, carbon use, recycling, government policy and related issues.

Future of Food and Drink Industries - for Bord Bia, Irish Food Board. Impact of global trends on food and drink sector, retailing, manufacturing and farming.

Future of bus and rail companies - impact of climate change - keynote conference presentation for Stagecoach - global leadership team and board.

Future of insurance and wealth management in South East Asia - internal event for senior leadership of leading global insurer.

Future of mobile telecom and wireless networking, business digital trends - for O2. Internal event for UK sales and marketing teams with O2 CEO.

Investment trends, risks and opportunities - for board of UK Church Commissioners (pension fund). Global trends, emerging markets, geopolitical issues, climate change.

Future of Dentistry in a Digital Age - client event for 3M - audience of some of the world's most innovative dentists, Professors in dentistry etc. Future of dental practice: insights from health care, digital technology and other industries. Patrick Dixon's Future of Dentistry video

Future of corporate real estate - intelligent buildings, climate control and global warming - for ARBS Exhibition Conference Melbourne 2008 for architects, builders, developers, planners, regulators, air conditoning engineers, heating system manufacturers.

Impact of Climate Change on Electricity Companies - for senior leadership of Vattenfall - power generation and sustainability.

Future of Logistics and Supply Chain Management - for Deutsche Post / DHL senior leaders

Reducing Risk in Financial Services - risk management and investment banking. Keynote for global risk management team of Investec.

Sustainable business - leadership issues - global warming, climate change, wider environmental issues, risk management, personal and family sustainability.

Future of Global Health Care and Women's Health - keynote for female senior business leaders.

Future of Banking - wider global issues and impact on IT-related issues. For global IT team of LLoyds TSB.

Human Resources - war for talent and related issues in context of global trends. For Global HR team of Unilever.

Future of Telecom - customer focus - for STC 200 senior leaders, Saudi Arabia and wider global telecom-related trends. Mobile, landlines, broadband, online services, corporate telephony, web communities, video

Future of dentistry and dental / health care trends - for Henry Schein CEO event - dental manufacturing and supply chain

Emerging markets - important issues for every business - London Business School MBA elective presentation on 10 key emerging market growth-related issues. Practical day-to-day challenges of operating in emerging markets. Opportunities and challenges for multinationals in nations such as India, China, Russia, South Africa and Brazil.

Future of the Aviation Industry - client event for Dassault Falcon, attended by 800 pilots and aviation specialists at NBAA in Atlanta. Covers major trends affecting airlines, charter companie and privately owned planes, plane manufacturers and related industries

leadership-trust/index.htm" target="_blank">Future Leadership Challenges - annual conference keynote for The Leadership Trust.

Future of Institutional and Investment Banking - RMB annual gobal leadership event

Future of Panama - client lunch-time event for HSBC Panama on the future growth of Panama economy, free trade centre trends, social and political issues, Panama canal, banking and financial services, tourism. See also HSBC Panama internal presentation including strategy development, innovation, leadership and change management. Also video comment on future of the Panama canal, plus video comment from the HSBC event on future of Panama economy.

Future of mobile phones. telecom and consumer lifestyles - MTN global leadership event with focus on Africa, Middle East and Asia

Future of public services and impact of new technology on customers - for Govnet London Connect conference

Future of telecom and related services - Telenor client event

Futurewise - future of Brazil and wider trends - Portugese language leadership event for 1,500 people in Porto Alegre - Fronteiras do Pensamento sponsored by Copesol

Future trends in Russia, Ukraine, Belarus and rest of region - Russian language presentation for PrivatBank

Future of the global insurance industry - for HSBC Insurance global leadership team

Future of health care and the pharmaceutical industry - internal event for senior leaders of Wyeth (UK)

Future of Business - Key trends for South Africa and beyond - leadership event

Building a Better Business - the key to management, marketing and motivation - and the $20,000 challenge. Leadership training for Barclays Bank / ABSA bank (South Africa, regional focus, Middle East)

Innovation - seven dimensions to a dynamic future senior executive event

Future of high technology companies in a rapidly changing world - client event for Infosys, who train over 25,000 new IT professionals each year

Insuring a Rapidly Changing World - major trends relevant to life insurance and health cover underwriting - for clients of Munich Re

Future of the Energy Industry - aiming for sustainability. Client event for Vattenfall on challenges and opportunities for global energy companies.

Future of the Petrochemical Industry - supply chain management and logistics: presentation for EPCA (European Petrochemical Association), looking at major challenges to the industry in the EU, current inneficiencies and major opportunities for cost savings.

Future of the Brewing Industry - Carlsburg event on trends impact on beer consumption, manufacturing, distribution and wider socio-demographic / political / lifestyle issues

Future Lessons from 3000 years in Ancient Greece and Rome - cruise lecture. What would Socrates, Plato, Aristotle, the Apostle Paul and Julius Caesar have made of today's world and our future challenges? Central issue of sustainability - personal, corporate, community, political and global. For YPO (Young Presidents Organization).

Creating Sustainable Enterprise for Impact conference. Global trends impact on business. Big issues such as global warming and how organisations are responding. Cause-related marketing. How corporate values bring competitive advantage. Corporate and Social Responsibility, winning the war for talent, HR and leadership issues, workplace motivation.

Making Things Happen - Welsh Assembly (Parliament) presentation for leaders in national and local government, health authorities, social services and other statutory agencies on leadership, motivation and change management

marketing/index.htm" target="_blank">Future of Retail Marketing - Envision event in Denmark for retail chains and entrepreneurs. Innovation, creativity, design and good marketing will contribute to business success but the most successful organisations will go further in understanding how consumers will think and feel, and will develop new products and services as a response. Huge market opportunities are being lost because of failure to understand fundamental shifts - for example the growing economic power of women, and of those over the age of 60, together with the explosive development of emerging market consumers, with 1 billion children becoming adults in the next 15 years.

Does Europe have a Future? Future economic outlook for the European Union and the impact of new technology on future productivity. SAP event for their top 50 clients - joint session with SAP's CEO at Saphire 2006. Reasons why EU productivity has grown so slowly compared to the US. Can the EU catch up and at the same time maintain a manufacturing base in the face of severe competition from China and India? Why information technology will play such a key role. Challenges for business and government leaders.

Future of Schools and Education - how do we prepare the global citizens of tomorrow for the future? Keynote for the US-based National Association of Independent Schools (NAIS). The future is changing faster than you can change a curriculum. Watch video on major challenges to schools in helping students develop the right skills to survive and succeed.

Future consumer trends in Europe - how European consumers are changing, winners and losers in retail. The impact of technology, demographics and social trends on consumer behaviour, attitudes and lifestyle choices. How manufacturers, service providers and retail outlets will have to change to survive.

Future trends in innovation and technology: client event for Unisys. Audience of Cheif Technology Officers (CTOs) and Chief Operating Officers (COOs) on global trends and their impact on business / IT strategy. Why so few CTOs make it to board level, and why most CEOs fail to take full advantage of what technology can deliver. Intregrating next-generation information technology into every dimension of future business development.

Global Trends and their impact on the insurance industry - Munich Re event for clients from Asia. How the insurance industry will be affected by wild cards (low probability, high impact events), why demographic forecasts for ageing and pensions liabilities are incorrect, the development of insurance industry in emerging markets, single issue activism and a rethink about business ethics.

Future of Banking, Management, Marketing and Motivation: Two day leadership seminar for Barclays Bank / Absa Bank - senior leaders from across sub-Saharan Africa. Day 1: Issues facing banking and African business development. Socio-demographic, political, technology and other factors including sustainable business development. Scenario creation - and using scenarios to test strategic assumptions. Day 2: Building a Better Business: the Future of Marketing, management and motivation. Also includes managing yourself and how to increase team productivity by up to 50%.

The New World Order - global trends, national governments, interest rates and other issues of importance to central bankers. Presentation for BNP Paribas clent event - audience of central bankers from more than 20 countries.

Why bother to change a corporation?: Business School MBA elective programme on Strategic Transformation. The crisis of purpose in business today and why most people don't care about your strategy or the future of the corporation. How to persuade people to change. How to connect with the passions people have for a better life. Reasons why people don't change. How to create effective leadership and ownership of your corporate strategy.

The Future of the Netherlands and wider global trends. Event for Young Bilderburg: young leaders who will shape the future of the Dutch economy.

Future of Real Estate Investment - issues which will drive real estate investment in both developed and emerging economies, with an analysis of the UK housing market. Client event for ultra-high net worth families and family office teams - for Strategic Real Estate Advisors (Stratreal).

Future of Travel and Tourism - impact on North West England economy - Blackpool, Manchester, Liverpool, Chester and the Lake District. Consumer trends. Business travel and the future patterns of corporate events. Impact of ageing and emerging markets. Client event for Northwest Development Agency.

Future of Manufacturing, Engineering and Innovation - impact of IT and wider trends - client event for Microsoft. Winners and losers in the outsoursing race. Virtual teams and virtual organisations. The future of manufacturing in Europe and other developed parts of the world.

Future of Telecom and Techniology Innovation - for AT&T client event. How consumer lifestyles, fashions and fads will be shaped by new personal technology, and why the future is about emotion. Industry examples of innovation and why radical divergence of product design is the route to future success. Risks of building strategy on imitation, in a race to converge on price (falling) and quality (ever more complicated multi-enabled devices).

The Future of Technology and Management - Watch video and slides of event for 2,000 CIO and CEO clients of Fujitsu Siemens on wide range of issues impacting business over the next decade - special emphasis on technology, innovation, fashions and fads, social changes, lifestyle issues, impact of demographics, outsourcing, motivation and leadership.

Future of Business: major trends, management, marketing and motivation - for Ruling Companies in Italy, with a particular focus on the Italian market, selling Italy as a brand, deomgraphic changes, consumer behaviour, Italian manufacturing and the future of the national economy.

The Science of Ageing - for Fixed Income Division of AIG. Why life expectancy forecasts are wrong and how science may be able to slow down the ageing process. Stem cells and cellular mechanisms that are linked to growing old. Socio-demographic and economic impact of longer life expectancy. Impact on every aspect of life including product design and service delivery. Contrasts with younger emerging economies with their 1 billion new consumers in the next 15 years.

Life after Convergence - Why so many companies are unprepared
Telecom companies become media houses. Food retailers become online banks. Computers become phones and video stores. However, while we will see convergence in products and services on price, features and quality, we will also see huge new investment in diversity. Where the future lies in product innovation.

The Future of Air Travel, Air Freight and Tourism - for Executive Board of Virgin Atlantic looking at a wide range of issues that are likely to shape airlines, business and personal travel and related expenditure. What will be the shape of airlines in future? How will airlines adapt to market pressures in a deregulated world which is increasingly dominated by short distance budget operators? (Some slides have been removed).

Future of Food and Drink Industry - for clients of 3i. Special focus on Central and Eastern Europe and broad trends which are likely to impact the economic development of the region. Fashions and fads in food retailing, RFID technology impact on distribution / wholesaling. Why regulations will continue to change. Winners and losers in the rapidly consolidating food retail sector.

The Future of Insurance, Pensions, Fund Management, Health and Life - Internal event for senior team members of Allianz looking at opportunities and challenges from such trends as new technology, demographic shifts, emerging markets and lifestyle choices. What will happen to life expectancy and the latest on ageing.

Investment Trends, Risks and Opportunities - for AIG Fixed Income global team. Issues to watch, including wild cards such as mutations in bird flu (economic impact). Demographics, geopolitical uncertainty, radical activism, reputational risk, compliance trends and emerging economies such as China and India.

Future of Corporate Communications, Branding and other Issues in the Insurance Industry - presentation at the International Communications Workshop organised by Group Corporate Affairs team of Aviva, to coincide with launch of new branding and core messages

Integrating the Supply Chain - Watch Video of client event / slides for 700 IBS clients on the future of management, logistics, manufacturing, wholesale and retail supply chain integration. Impact of RFID technology with major savings in every aspect of supply chain operations, including stock reduction and theft control. See also article on the future of logistics.

How to Manage Yourself - personal and business survival guide. The crisis of purpose in most corporations, where it is all going, why it really matters and what to do about it. The elusive secret of personal happiness. How to increase your personal productivity by up to 50% by using the 80:20 rule - and have more free time. Discovering your personal agenda. How to manage stress and how to listen to what your own body is telling you. How to make great things happen at work, at home and in your wider world.

The Future of Car Recycling and Vehicle Disposal 10th anniversary client event for ARN on this rapidly growing industry. Impact of new European regulations on disposal of 9 million vehicles a year. How the Netherlands will continue to lead the way with advanced shredder technology, with competition from Central Europe as well as China - already taking 50% of all UK recycled plastic bottles.

The Future of Distribution: postal services, couriers,and other logistics issues - for Swedish Post (Posten). See also video of similar presentation for IBS.

Futurewise - Futurepeople: Future of Management and Motivation - Keynote for IBEC (Ireland) on aligning people with business strategy in a rapidly changing world where strategy itself is often overtaken by events. Trends for HR professionals to watch out for. Connecting with passion to get the best out of teams.

The Future of Telecom: mobile phones, broadband devices, convergence of multimedia, video-on-demand, consumer behaviour and other lifestyle issues. Impact on customer expectations of telecom call centres and retail outlets / service centres. Internal event for TDC. Grib din fremtid - in Danish language.

Challenges for CIOs: Technology Innovation and Business Strategy - Keynote for 700 of IBM's major European clients. Why the future is not about technology, but about emotion. Why so many IT projects go wrong. How to make sure you get the best from technology partnerships. Why the future of technology is about emotion. How consumers and managers are changing. Future-proofing your IT projects. The importance of total integration at every level of IT issues into long term business planning.

IBM keynote summary: "The global business environment will continue to shift faster than teams can adjust code, while next-generation technology will itself radically alter products, services, markets and management. Success in IT innovation will depend on CEOs having a far deeper grasp of IT complexities, and CIOs having a far broader understanding of the possible ways in which the business environment could change. It will also depend on choosing the right technology partners, attention to detail in the early stages, and careful step-wise implementation. The result will be visionary, lower cost, more reliable, modular systems, at the heart of business strategy, which allow for rapid evolution, staying ahead of the needs of the whole organisation."

The Future of Advertising and Marketing Agencies - and who on earth is going to make any money out of it all? Will agencies be paid on commission or ideas? Intellectual copyright. Why the industry is going to face major restructuring. The threat from radical new players like Google Adsense and what corporations are going to want from agencies in future. Marketing trends and opportunities. Keynote for MCCA conference.

Compliance in IT systems design - banking and financial services - IDC keynote for CIOs of large banks and insurance companies

Future of Private Banking - how high net worth client needs are changing, and wider trends affecting private banking relationships, expectations, products and services - the special role of privatebancassurance in wealth management - for Lombard.

Challenges to Fund Management Industry - presentation to the executive board of Morgan Stanley Investment bank on major issues likely to affect how the business operates, and the wider investment climate. Why actively managed retail funds are so unpopular amongst fund managers themselves as a home for their own money. Another mis-selling scandal in the making?

The Future of Global Legal Firms - for Linklaters, looking at major issues that will affect multinational professional organisations and the clients they serve. How legal firms are going to have to change to keep pace with client demands. Why narrow compliance is dead except as a defensive strategy to keep board members out of prison, and why legal firms in future will need to provide broader ethical guidance as well as compliance advice, based on an assessment of where public opinion and legislators are likely to go in future.

HSBC Chairman's Leadership Summit September 2005 - Opening keynote at event for HSBC senior leadership on issues likely to impact the bank, for some of the senior HSBC global leadership team.

Global Trends in Banking and Financial Services - executive training programme for senior teams at Credit Suisse, covering a broad range of issues that are likely to affect the bank and personal / corporate clients.

Future of Fund Management, Instutional Asset Management, wholesale and retailn investment products, risks and opportunities - Keynote at client event for Credit Suisse Asset Management, for large institutional investors eg pension fund executives.

ABN AMRO Executive Education - Six Faces of the Future - What major trends do banking executives need to watch? Wild cards, managing uncertainty and creating new business opportunities. Impact of outsourcing, globalisation, ageing and emerging market issues.

The Future of Fund Management - major threats and opportunities in asset management, wealth creation, insitutional investment and private banking. Keynote address at Monaco ICBI Fund Management Conference. Why actively managed retail funds could be set for a major mis-selling crisis, with potential impact on reputation of whole industry. Also video.

The Future of Credit Unions and other financial services trends - presentation for Board members of Credit Unions based in the US - at London Business School.

Future trends - ABN AMRO client event for top Australian CEOs - Making money in merging markets, China, India, outsourcing impact, future of marketing, consumer trends, demographics, next-generation technology, geopolitical changes and management challenges.

Marketing Future of marketing, management and motivation - and why your company could disappear in a week ICBI opening keynote at customer relationship management event. 10 steps to marketing success. How to capture and keep customers. Why customers are fed up with direct mail and what to do about it. How to build powerful customer tribes. How to keep your customers coming back for more. How to connect with passion. The ultimate marketing slogan and the $20,000 marketing challenge.

Future of Health Care - workshop for UK NHS National Primary Care Trust (communit health care) looking at health trends, future of the pharmaceutical industry, biotechnology innovation, demographics, lifestyle choices and performance enhancement, unmet medical needs, government policy.

The Future of China - economic, social, deomgraphic and consumer trends in China - historic data and projections. What will be the future of China? How should large corporations develop effective strategy? What are the risks and opportunities in business ventures? Impact on rest of the world of China's continued economic growth.

Emerging Markets - Future Challenges and Opportunities in places like India, China, Russia, Brazil, South Africa, Czech Republic, Thailand. Why everyone is looking to India and China, yet few are making money there. Business school presentation for MBA / Executive MBA elective: practical issues facing local and global investors, risk avoidance, staying ahead, outsourcing. The Three Es of Emerging Markets. Ethical issues, compliance, global branding, harnessing people-movements to develop new markets and sales teams, social networking, developing the bottom of the pyramid. Using business to create a better future. Where the greatest business opportunities are in emerging markets and practical steps to long term success.

Venture Capital Investment - in high tech / biotech companies. The next big investment opportunities in new technology, biotech and related areas. Event for 500 bankers, analysts, private equity investors, business angels, start-ups, entrepreneurs, venture capital fund managers, scientists, government leaders and media - for Vaekstfonden, Denmark

Managing risk in an uncertain world - Risk management client event for Zurich Financial Services in Lucerne Switzerland. How to manage risk more effectively, with clear vision of future potential liabilities and "wild cards". Many of the greatest risks are the hardest to measure - for example loss of brand value, reputation, sales and share value following high profile scandal. Risk management is becoming more complex and new strategies are needed, including better early warning systems.

Impact of Global Trends on Your Marketing Plan - Direct marketing, TV, radio and press campaigns, interactive marketing, e-mail and online promotions, viral marketing. Changes in consumer behavior, lifestyles and values. Event for 900 senior marketing executives and CEOs of advertising agencies sponsored by Post Danmark. Closing session on marketingplan/index.htm" target="_blank">10 ways to improve your marketing plan. Also presentation to the Portugese Marketing Federation.

The Future of Ageing - Slides and Video. Why the first 150 year old human being could already be alive. Science, demographics, politics and society impact of a society that could see huge increases in life expectancy over the next 50 years. Keynote for senior leadership of AARP - US action group representing over 35 million people over the age of 50.

Interactive Marketing - Direct marketing in a digital world: iDTV, PDAs, SMS, mobile marketing, viral marketing, video marketing, opt-in e-mail campaigns - Keynote event for Skynet Belgacom high-level client marketing event. Low cost, high impact advertising campaigns - why interactive marketing is set to grow rapidly. Key marketing success stories and dangers to avoid.

Six Faces of the Future - HSBC Chairman's leadership event for senior global team of the bank, looking at major opportunities and challenges to the bank in a rapidly changing world.

Investment fund management - global issues - event for 700 Morley Fund Management executives. Future of fund management, why compliance is dead except as a defensive strategy, how investor behavior is changing and what it means for strategy and growth forecasts.

Trends affecting Sweden, Norway and Finland and beyond - Telecom client event for Teliasonera, on impact of new technology on business structure, virtual working, personal relationships, family life and consumer choices..

Future Design and Innovation - for Danish Design Centre annual awards ceremony. Why the future is about engaging emotion, rather than just technology. Impact of next-generation design on our lives. Innovating for a better future.

Future of Philips - consumer electronics and medical technology - event for senior global management team annual meeting. Winners and losers in the race for better technology innovation.

Future of travel and tourism - Tourism in Ireland presentation for global team. Trends in travel and tourism and strategies to encourage higher profile of Ireland as a preferred destination for leisure and business travellers.

Issues for Hedge Fund Managers - ABN AMRO client event for leading Hedge Fund executives on anticipating wild card risks, new technology, biotech, ageing, health and emerging markets such as India and China.

Managing Yourself - Business School workshop on self-development for executives including taking hold of your own future, staying healthy in body, mind and spirit, work-life balance,how to use the 80:20 rule to achieve more with less, and how to achieve your own life-targets.

Building a Better Business - how the latest book came into being, and why future success depends on showing how you are building a better world for your customers, workers, suppliers, shareholders and wider community. Presentation for the Transformational Business Network annual conference (TBN).

HSBC senior leadership programme - Business school presentation on the future for global investment specialists.

The Future of Estonia - Presentation to senior Estonia government officials about future trends and their impact on Estonia business, economy, society and political life - with particular focus on entry into the EU.

The Future of Food, Fashions and Fads - presentation for the European food packaging industry on the future of the food industry, food packaging, consumer trends, health issues and related topics.

The Future of Commercial Insurance Brokers - and related issues. Client event for Zurich Financial Services for their largest commercial insurance brokers in the UK, covering important insurance-related trends and risk management.

The Future of Digital and Biotech - dinner speech at technology awards evening for State of Connecticut, covering next-generation innovation, research and development.

Future of Self-Service - Impact of self-service technology on retail, airlines, rail travel, hotels, leisure, banking, customer relationship and online support. Kiosks, ATMs, self check-in etc. NCR client conference - audience from 20 nations, mainly retail and banking.

Future of Latvia - Presentation to business leaders in Riga.

Future of London - Presentation for Young Presidents Organisation (YPO) in London with a local view of trends affecting business, children, retired people, personal life and our wider world. This event was aimed at three generations, including children of successful entrepreneurs and their grandparents - with a 70 year age range. Similar presentations for YPO Houston Chapter and YPO Turkey Chapters.

Banking - new technologies and strategies for a rapidly changing world. Key issues affecting future of Deutsche Bank and other financial service companies. Presentation for senior IT managers.

Innovate!: Great Ideas for Radical Business Success - Innovation is fundamental to ongoing business health and product development. Macro-innovation and micro-innovation and why you need both. How to generate low cost, practical ideas that you can implement tomorrow at almost zero cost, with immediate support from management and rapid payback. Use the same process to find major innovations to transform your entire business..

RFID - the next technowave. Great business opportunity or brave new world? Get ready for more than 20 billion wireless barcodes a year, using Radio Frequency Identification Devices. Wal-Mart, Tesco and other chains push ahead. Huge impact on manufacturing, distribution and retail - with growing consumer concerns about privacy.

The Spirit of Success - Video and slides of Fedex / Times of India / Economic Times presentation for CEOs in Dubai on future trends and people issues (recruitment, motivation, retention, harnessing passion), that will underpin sustainable corporate success. Seminar repeated in Delhi and Mumbai looking at the future of business success in India.

Future of Insurance Industry and Financial Services - Business School presentation on major trends affecting marketing, products, services, leadership, risk management, change management, recruitment, retention, motivation and business ethics, plus some personal issues - for Aviva.

European School of Management and Technology - half-day on global trends and leadership challenges / maket opportunities.

The Future of Corporate and Social Responsibility - Business school senior executive programme presentation. Why the rules, expectations and ethics are changing for business. Why corporate and social responsibility is now a survival issue for all large corporations. How the right strategy for corporate and social responsibility can win customers, insure against media attack, strengthen your brand and build team loyalty.

Change Management and Strategic Transformation - MBA / Executive MBA seminar on future trends affecting corporations, and how to persuade people to change. Capturing passion to build a better world - and why failure to "in hearts and minds" is the most common reason for organisational inertia.

The Future of the Chemical Industry and Chemistry Education - Keynote speech at 100th anniversary of the Dutch Royal Chemical Society. Huge life-changing advances in biotech and in many manufacturing processes will be critically dependent on advances in chemistry and related scientific areas. The traditional chemistry industry cannot survive without radical change and chemistry itself has to be totally integrated into other disciplines in future.

The Future of Medicine, biotech, health care, pharmaceutical companies and medical technology - presentation for ABN AMRO corporate bankers

Techno-children: the Impact of New Technology on Children and Teenagers - Client event for Mobilcom Austria looking at ways in which children will use technology in future, the social and emotional impact on them, as well as on society as they carry new behavior into the workplace as well as into their personal adult lives.

Global Justice - fighting global poverty, Make Poverty History campaign, AIDS in Africa, coffee industry crisis, Christian action and church responses - for St John's Church, Ealing London

The Future of Frozen Food Industry - Presentation for senior team of Schwan's Frozen Foods looking at all aspect of food production, wholesale, distribution and retailing - and the future of frozen food / competing technologies.

Future of the BBC - public service broadcasting trends - UK TV, radio and world service - charter review. Presentation to 100 of most senior BBC executives. Sensitive client information has been deleted from this presentation. See also Future of BBC News Services - BBC World TV News, Global News and BBC World Service News. Presentation for senior news editors / executives.

Strategic Transformation - Business school executive programme presentation. You can have the best strategy in the world, the best change management methods and the most talented teams but if your view of the future is wrong you will just go even faster in the wrong direction. We need future-vision, to be futurewise, and to understand what the prime drivers of strategic transformation will be for the next decade. A single four-word phrase will be the basis of all strategic transformation, all marketing and mission statements and all successful leadership...

Corenet - The Future of Corporate Real Estate Management - closing keynote at conference for 2,000 people in Salt Lake City.... also similar presentation at Corenet Shanghai China / Asia event - one hour video - needs free RealVideo player - click below.
 

The Future of Europe - keynote speech for UNIDO looking at the impact of joining the EU for 10 accession countries, and also the effect of new technology on their economies. Audience: cabinet ministers of 7 nations, and other government leaders from another six, including the Deputy Prime Minister of Ireland.

Real Success - Doing Great Things in the Right Way. How future changes in values will impact marketing, motivation, management, leadership, corporate governance and investor behaviour. Success Plus. - Day-long seminar for clients of UBS.

Futurewise CEO Summit - keynote address at Unisys client event for CEOs of some of Europe's largest corporations including Banque de France, on global trends, the future of Europe, changes in consumer behaviour, investor expectations and corporate ethics (Grand Prix / Monaco - co-themed multimedia presentation).

Future of medical technology and health care services - event for Siemens Medical. The future of medicine, health care and technology challenges / opportunities.

Future of the Petrochemical Industry - also covers future of the energy industry. Presentation on global trends for ExxonMobil Graduate Development Programme (business school).

The future of engineering and the engineering industry - Impact of new technologes and processes on the engineering industry, and how global trends will affect large, medium and small engineering companies. Keynote at UK engineering exhibition.

Future of Financial Services - Presentation for ABN AMRO executive traning programme on the future of ABN AMRO bank, global trends impacting all banks and other financial services organisations. Also looks at future leadership and personal challenges.

The Future of the Pharmaceutical Industry - Global trends affecting large drug companies. What kind of pharmaceutical products will dominate in 15 years time? How will medicine be changed by biotech? What will happen to common disease patterns and the ageing process? Major ethical and political issues.

The Future of Health Care Technologies - Smith and Nephew presentation to senior leadership on factors that will impact endoscopy, orthopaedics and wound healing in the context of a medical revolution driven by biotech over the next two decades.

The Future of the Corporate Travel Industry - Slides and video of keynote speech to over 1,000 corporate travel executives. Winners and losers in the executive travel industry: what future business travellers will demand and how to develop market share.

The Future of Marketing - Finnish Marketing Federation - slides and video of keynote to 500 marketing executives. Get ready for another revolution in consumer values, expectations and behavior. Many messages that worked in the past will damage brands in future. A single four word phrase will be the basis of every new slogan, every marketing campaign, every mission statement and every leadership strategy that works... Take hold of the future or the future will take hold of you.

The Future of Medicine - and the impact of genetics on health care - Slides and video of keynote to 150 biotech researchers, analysts, investors and media at launch of new biotech research facility in Zurich..

Aquavision - Future of aquaculture and fish farming - industry event for 400 CEOs and senior leaders in fish farming industry sponsored by Nutreco who "make" 70% of all fish-farmed salmon spawn world-wide.

The Future of Credit Unions - key trends affecting the future of US credit unions and the financial services industry in general. Business School presentation for CUES - 70 Credit Union board members.

Virtual management - Future of global long-distance teams in a digital age. Human resource management issues, strategic transformation, change management.

Future of the Energy Industry - ExxonMobil presentation (1/2 day) - business school graduate programme on global trends affecting petrochemical and energy industry over next 10-20 years.

Royal Mail - Virtual working / flexible mobile working - workshop for 30 executives confronted by complex management issues in a state-owned corporation facing huge change and aggresive competition.

Zurich Financial Services - internal event looking at low probability, high impact health-related risks and geopolitical changes as well as single issue activism - impact on underwriting policy and risk assesment.

Jaguar - Some global trends affecting future luxury car / auto market - strategy meeting for research and development team at Jaguar. Does not cover technology (different sesion at same event).

Tetrapak - The future of liquid food - global trends - client event for 600 people in the theatre of a cruise liner - followed later by singer Elton John. Video of this presentation is also available.

European Coffee Federation - Future of the coffee industry - reinventing a 300 year old drink. Why the taste of the future will be shaped by the values of the future.

Oasis Esteem - Sex Education in Schools - trends and research - HIV and AIDS issues - teenage pregnancy - a practical approach based on 16 years experience in many differrent nations of ACET International Alliance - the AIDS organisation started by Dr Patrick Dixon in 1988.

ESMT leadership day, Equipped to Lead , Holy Trinity Brompton church (HTB) - leadership event for 350 25-35 year olds on future trends and making a difference

Patrick Dixon's YouTube Channel - over 2 million video views.  Search 300 videos by topic.

Economics, Finance & Financial Services
Banking - many of Patrick's clients are global banks, investment funds
Economics issues - Patrick creates a big picture of global trends
Insurance - Patrick has worked with many of the world's largest insurers

Technology
Technology - Patrick works with many of the world's largest computer, software, telecom, internet and biotech companies
Online communities - Web 2.0 - how online communities will drive your business
Mobile phones - future of telecom, wireless devices, virtual communities, positional advertising
Convergence and divergence - why all competitive advantage comes from divergence
RFID technology - impact on retail, wholesale, distribution and manufacturing

Health and Education
Health care - key trends in health, ageing, biotech, hospitals, clinics
Pharmaceutical industry - impact of the biotech revolution
Education - future of teaching in high schools, colleges and business school

Leadership, Management & Strategy
Change management - a recurring theme
Risk management - preparing for the unexpected
Innovation - smart innovation, open innovation and crowdsourcing
Leadership - effective ways to drive organisations forward
Logistics and supply chain - critical issues in manufacturing and wholesale
Motivation - how to inspire people to make great things happen
Women at work - challenges for corporations in winning war for talent
Outsourcing - what is going to happen next

Marketing
Advertising - why traditional approaches are dead in an online world
Customers - how customer demands are changing and why
Customer focus - why many corporations need a reality check, to succeed in future
Marketing - future of marketing and brand development

Travel, Tourism, Energy, Resources and Environment
Travel - future of aviation, road, rail, shipping - for business and leisure
Biofuels - food for fuel? Next generation biofuels.
Commodities - impact of emerging markets
Energy industry - future energy from oil, gas, coal, nuclear, renewables
Petrochemical industry - how the industry will change and why
Climate change - why the future is about emotion, not just the science
Sustainability - what does it mean for your business?

Other Topics and Types of Audience
Real estate - key trends in commercial and residential real estate industries
Retailing - developing the customer experience
Looking for other topics?  Search on Patrick Dixon's YouTube Futurist channel.

FULL PRESENTATIONS VIDEOS

Future of consumers, online communities and corporations - 800 CEOs and senior IT leaders for ICT Belgacom - central podium with 4 screens surrounded on every side by pre-dinner audience. 50 minute keynote - 2007.

Future of the European Petrochemical Industry - logistics and supply chain - half hour keynote presentation for 400 representatives of the European Petrochemical Association (EPCA). This is an example of a highly customised presentation for a specific audience - 2007.

How the future of America will be dominated by older consumers, lifestyle choices and growth of financial and political power of senior citizens - presentation for national leadership team of AARP (American association for people over the age of 50) - 2005.

Take Hold of Your Future - Event for 2,000 clients of Fujitsu Siemens in Munich - shared platform with their CEO. 35 minutes keynote on technology and other major trends affecting the future of large cororporations. 2005.

Future of phones, computers, consumer choices and lifestyle changes in emerging markets - staged multimedia event for 450 of MTN's global leadership team - South Africa 2007. Interesting layout with huge screens, and raised walkways into audience.

Future of Education - one hour lecture for 100 Head Teachers of US High Schools (NAIS). What kind of education do tomorrow's citizens need? How does the way we teach people need to change? What kind of world do we need to prepare students for? - 2006.

Futurewise - Six Faces of Global Change and the Future of Banking - keynote lecture to 400 financial intermediaries of UBS in Switzerland, with focus on private banking clients, family offices, fund management, financial services and wealth management - 2006. 10 years experience of speaking at UBS events.

Future customer trends, consumers, marketing, products and services - event for 350 clients of Siemens, mostly Chief Technology Offices, or Chief Information Officers, from multinationals.

Future technology trends and what people really want - personally and in business - one hour video-linked seminar in small room for 25 leaders at Dimension Data in Johannesburg, audiences in three other sites - 2007.

How to Make Great Things Happen - one hour presentation for 250 government workers organised by the Welsh Parliament (Assembly). Participants from health, education, police, fire services, social services, transport. Keys to effective leadership, change management and improved productivity - 2007.

Other YOUTUBE VIDEOS mainly of lectures by Dr Patrick Dixon
10 billion computers the size of a grain of sand
Connecting with emotion of customers online
1 billion new consumers - future
Human cloning - part one - who is doing human cloning
Human cloning - part two - why investors don't like cloning
Future of genetic engineering
Future of Ukraine - economy and country
Future of Malaysia Economy
Future of Kazakhstan - economy
Future will be driven by emotion - take hold of your future!
Make It Work! Scandal: technology sold which doesn't work
Motivation, leadership, change management, passion
Mobile phone sales in emerging economies - bottom of pyramid
Why consumers won't wait - impatience online
Can we stop getting old - reverse ageing? New research.
Impact of ageing population in Europe and Russia
Secret of Change Management - by Patrick Dixon
Purpose of fund management - by Patrick Dixon
Fund Management Risks - Potential Crisis - Patrick Dixon
Wild cards - low probability, high impact events
Tribalism - greatest force in world today
Low cost mobile phones in emerging nation / Africa
Why market research gives wrong results - blogging
Mobile phone radiation - health risks - facts
Convergence and Divergence - future technology and consumers
Mobile phone impact on poorest nations
The world is changing faster than you can make decisions
Stopping spread of AIDS in Africa
Truth about global warming and practical answers
Future of Malaysia
Funny cartoon about US immigration - lessons for customer services
Funny cartoon about call-centre customer frustrations
Can we find a cure for diabetes?
Can we find a cure for rheumatoid arthritis?
Joint replacement for osteoarthritis and rheumatoid arthritis
Future of the pharmaceutical industry
What is a Futurist?
How do you become a Futurist?
Futurist methodology - research into trends
How do you keep up to date as a Futurist?
What have I got wrong as a Futurist?
Work-life balance - future working patterns
Work-life balance in emerging economies
Innovation
Real estate and construction industry trends
Life insurance, pensions and life expectancy trends
Staying young: impact of anti-ageing research
Leadership and motivation at work
How business can reduce global poverty
Limits to economic growth and sustainability
Why ports, ships and shipping will dominate global trade
Global warming and sustainability
Global warming - why planting trees has limited impact
Water wars - and water shortages
More nations, rise of nationalism
Economic growth of former Soviet Bloc nations, Russia etc
Too late for outsourcing?
Outsourcing in India, China, Asia and Central Europe
Mobile phones, banking and financial services trends
Convergence and divergence
Power of tribes, clash of cultures and impact on consumer groups
Bottom of the pyramid - selling to the world's poor and making a difference
Microloans, microfinance, microcredit and future of banking
Motivation at work - leadership and passion
Intellectual copyright - protection of patents
Motivation at work - increase work place motivation
Business values - corporate and social responsability really matters
Global brands, mergers and demergers
Customer focus and call-centre disasters
Women consumers rule - female customer trends
Insurance market in India, China and rest of Asia
Online communities and impact on marketing
Migration, immigration and the ageing crisis
Future of the Petrochemical Industry
Sovereign wealth funds - investment trends
Commodity shortages and prices - global trends
Retail revolution in India
Demographic impact on business
Trust and business leadership, marketing and brand image
Market research - how to get results
Risk management - leadership in uncertain times - wild cards
People do crazy things under pressure - power of emotion
Managing speed of change - leadership styles
Six faces of the future
Institutional blindness
Future of education
Education trends in a fast-changing world
Future technology and education
Future education - instant knowledge

Archive - samples of older presentations - some as early as 1997: Biotechnology, BT Openworld launch, Corporate Real Estate trends, Credit Suisse Asset Management - leadership event, Future of Brewing and Beverages Industry, Future of Human Resources, Future of Business Schools, Response to 9/11, Future of Professional Service Firms and Law / Legal Trends, Future of batteries, shavers and related technology.Future of Technology - for Jebel Ali Free Zone in Dubai. Swiss engineering company, POM, Future of Regulation and International Law, Future of Retail Chains and Department Stores, Future of Food, Clothing and Consumer Goods - Retail, Presentation for World Bank conference on economic impact of SARS . Future of Gas Industry - and energy companies (2002) , UBSPOM. Engineering trends.

You can watch a recent video of a one hour multimedia presentation on future trends / digital age (500 people) or a video of a less formal presentation on the Future of Ageing, longevity, fashions and fads to 550 senior leadership of AARP (a US association for over 50s with 35 million members).

Watch video of a high energy performance in a theatre to 700 people on Future Management, Logistics, Distribution, Wholesale and Retail. Watch video on the Future of Schools and Education for NAIS (US). Watch video on The Spirit of Success.(Dubai).

Related news items:
Future of Marketing - Marketing Videos
Future of Travel Industry Google Travel and Tourism Conferen…
Marketing to Tribes, consumer groups, targets social market…
Brands: impact social networks on marketing, corporate image
Leadership, Motivation, Great Corporate Events
Leadership, Motivational Management Training - Great Events …
Older consumers - new marketing and brands
Happynomics - interview on happiness and wealth
2020 Future seen from 2015: Futurist Mobile World
Carbon Offsetting - Global Warming Action
Cost of global warming - practical answers
The $40 trillion climate change business
Marketing to Older Consumers
Marketing to Older Consumers
Marketing in an Economic Crisis
Happynomics - business, wealth and happiness
How to lose $ millions - video on risk
Future of Pharmaceutical Industry - Video
How Green IT saves money and energy, improves image and envi…
How Green is Your IT? Save cost, better image

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
EXPOSED: Unlawful CISPA bill ordered at Davos's BIG DATA Traitor's Retreat
« Reply #21 on: April 27, 2012, 09:27:25 PM »
1930's Germany
IBM Punchcard Technology Used to Identify, Track, Stalk, Harass, Extort, Torture, and Exterminate Millions of Innocents by a Cancererous 'New World Order' Enemy that Infiltrated the German Constitutional Republic
--------------
2010's America
IBM 'Big Data' Technology Planning to be Used to Identify, Track, Stalk, Harass, Extort, Torture, and Exterminate Millions of Innocents by a Cancerous 'New World Order' Enemy that is Infiltrating the American Constitutional Republic


U.S. government commits big R&D money to 'Big Data'
http://www.zdnet.com/blog/btl/us-government-commits-big-r-d-money-to-big-data/72760
By Jason Hiner | March 29, 2012, 12:50pm PDT

Summary: The U.S. government is investing $200 million in big data projects to help the U.S. jump ahead in the next frontier of computing.

Calling it one of the most important public investments in technology since the rise of supercomputing and the Internet, six U.S. federal agencies teamed up on Thursday to announce a new $200 million investment “to greatly improve the tools and techniques needed to access, organize, and glean discoveries from huge volumes of digital data” said the White House Office of Science and Technology Policy (OSTP).

This is a pure research and development initiative that will manifest itself as public/private partnerships and new projects that will drive big data investments in government, education, and business. The catalyst for this move came from the President’s Council of Advisors on Science and Technology, which recommended investing more in big data in order to deal with some the biggest challenges in the U.S., including issues in health care, energy, and defense.

The agencies involved in the announcement were:

National Institues of Health
Department of Energy
National Science Foundation
Department of Defense
DARPA
U.S. Geological Survey

The most obvious agencies missing were NASA and the National Oceanic and Atmospheric Administration, which both gather massive amounts of data that could benefit from big data tools and serve the new cause. White House officials said that both agencies will eventually be involved.

The OSTP’s stated goals for the $200 million will be:

Advance state-of-the-art core technologies needed to collect, store, preserve, manage, analyze, and share huge quantities of data.
Harness these technologies to accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning; and
Expand the workforce needed to develop and use Big Data technologies.

Confusingly, the Department of Defense also stated that it is “placing a big bet on big data.” It stated that it will invest $250 million annually in big data projects across various departments of the military. The DoD said that it wants to “harness and utilize massive data in new ways and bring together sensing, perception and decision support to make truly autonomous systems that can maneuver and make decisions on their own.” That’s the kind of thing that will scare some people because it sounds like robots and drones that are going to become smart enough to make their own decisions. It’s the stuff science fiction writers have been anticipating, and in some cases fearing, for over half a century. It’s unclear whether the DoD’s $250 annual million investment is separate from the overall $200 million R&D that the OSTP announced.

John Holdren, Director of the White House Office of Science and Technology Policy, said, “In the same way that past federal investments in information technology R&D led to dramatic advances in supercomputing and the creation of the Internet, the initiative we are launching today promises to transform our ability to use Big Data for scientific discovery, environmental and biomedical research, education, and national security.”

In the joint press conference, the agency chiefs not only threw out flowery hyperbole about the potential impact of big data in helping solve some of the most important problems that the U.S. is facing in the years ahead, but there were also bureaucrats and technologists who clearly have a deep understanding of the engineering and computer science behind big data and were very enthusiastic about this investment. They were confident that it’s going to enable the U.S. to take a big step forward in one of the next frontiers of computing.
DAM Lowdown: Age of Big Data, Metadata for Government, DAM Product Updates
http://www.cmswire.com/cms/digital-asset-management/dam-lowdown-age-of-big-data-metadata-for-government-dam-product-updates-014514.php
By Rikki Endsley (@rikkiends)   Feb 14, 2012   

Last weekend, The New York Times ran an interesting article about big data’s impact on the world. If you didn’t already think big data was cool, you will after reading this article. We also look at recent product updates and the important role metadata plays in the government.
Age of Big Data

On February 11, The New York Times ran a feature article called The Age of Big Data. “Welcome to the Age of Big Data,” the article says. “The new megarich of Silicon Valley, first at Google and now Facebook, are masters at harnessing the data of the Web — online searches, posts and messages — with Internet advertising.”

Not only does the article explain the concept of big data, it also examines the tools for harnessing data and the predictive potential it holds. For example, the article explains, “Researchers have found a spike in Google search requests for terms like 'flu symptoms' and “'lu treatments' a couple of weeks before there is an increase in flu patients coming to hospital emergency rooms in a region (and emergency room reports usually lag behind visits by two weeks or so).”
CoreSource for SAGE

SAGE, an independent academic publisher of journals, books and electronic media, chose Ingram Content Group's CoreSource for the distribution and management of its e-book and print-book files. CoreSource is an online solution for storing, managing and distributing digital content.

Metadata in the Government

In his commentary, Good metadata means good government, Michael Daconta, former metadata program manager for the Homeland Security Department, explains that the key to metadata design is developing the best descriptive fields that increase the usage value of the data to the end user. “These types of fields can be discovered by asking questions such as ‘How do our users get value out of our data?’ and then walking backward from those answers to the fields that best distinguish the good from the bad (or the proverbial wheat from the chaff),” he says. Daconta is also the author of the Information As Product book.

Dassault Systèmes Acquires Netvibes

French software company Dassault Systèmes acquired Netvibes, a social web analytics platform provider. “If you like Netvibes, you will love the new Netvibes,” says Netvibes CEO Freddy Mini. “Our brand, business, website and team will stay. What will change is that all our products will innovate even faster thanks to our deep relationship with Dassault Systèmes.”

Picturepark 8.2 Announced

Almost a month after announcing version 8.1.9, Picturepark announced the 8.2 release of the company’s DAM solution. According to the announcement, the latest version comes with enhanced support for creative processes and integration into Adobe Creative Suite.

Kurzweil Accelerating Intelligence newsletter
The Age of Big Data

http://www.kurzweilai.net/the-age-of-big-data

At the World Economic Forum last month in Davos, Switzerland, Big Data was a marquee topic.
A report by the forum, “Big Data, Big Impact,” declared data a new class of economic asset, like currency or gold.
Recruiting in the Age of Big Data: A Guide for Recruiters
http://www.recruiter.com/i/recruiting-in-the-age-of-big-data-a-guide-for-recruiters/
Jon Parks March 7, 2012

Big Data is hiring, and three of the fastest growing areas of expertise and job growth are in marketing (data-analytics), finance (quant or quantitative finance) and healthcare (bio-informatics).

Few understand what “Big Data” means – much less what it hopes to accomplish.

Hiring for Big Data

If you what to know what these terms mean to employers, and how they’re accomplished, a few similarities and differences help point the way.

Big Data is about the massive quantity of data (information), and its potential for:

targeting and interpreting consumer behavior for advertising and marketing, also called “data-analytics;”
modeling financial events and expectations, also called “quant-finance or quantitative finance;” and
making sense of drugs and therapies that work for some but prove toxic or dangerous for others in a healthcare context, also called “bio-informatics.”

Big Data for Recruiters

To illustrate the approach to problem solving and how it works, consider the pile of resumes on your desk, or the mass of applicants in your data-base.

Since hiring someone might be the near term objective, we’ll consider that result to be a perfect score. The whole process is complicated, and job applicants can improve their chances with cover letters, resumes, follow-up, and referrals. Lots of things take place during this process.

Big Data helps determine how instrumental (causal) these things are to the objective or goal. Some things may actually be unhelpful and lower the chance of being hired, and some things may not improve the chances at all, or improve them very little.

In the world of Big Data, all of these events are scored against their ability to improve the chance that an applicant will be hired. The math can be very complicated, but the results are never any better than the information and quality of what goes into the process.

Mathematicians Don’t Make Good Recruiters

Computers, like the math jocks that use them, speak their own language, and that language (math) does a poor job describing or expressing an applicant’s likeability, charisma, temperament, or any of the dozens of things recruiters look for before hiring someone.

One thing for certain is that Big Data does not work, nor even begin, before the problem being described can be translated and represented mathematically. Processes must be identified, outcomes scored, events observed, and their impact or usefulness inferred.


Nazi War Criminal Spills the Beans in 1946 about BIG DATA and IBM was the main contractor then as it is now.

THIS IS A TRANSCRIPT OF THE ACTUAL NUREMBERG TRIAL IN 1946

NOTE: Albert Speer was the head of all armaments for Hitler. When he took over the position, he transformed the armament and bombarding operations by introducing a system of 'rationalization' into the war operations by including businessmen into the process of evaluating war product development and goals of 'efficiency'. His operations led to the development of so called 'vengence' weapons like the V2. Although he lied his ass off regarding his knowledge of death camps, he was perhaps one of the greatest whistleblowers regarding a cybernetic/technogratic enslavement system to come. It is serendipitous that Kennedy hired McNamara as Secretary of Defense and that the power elite in the US used McNamara's similar skills set as Speer to engage in 'rational' genocides in SE Asia. Today we are seeing that our entire defense operations are being controlled by technocrats with similar visions of global cbernetic enslavement.
http://www.nizkor.org/hweb/imt/tgmwc/tgmwc-22/tgmwc-22-216-07.shtml

THE PRESIDENT: I call on the defendant Albert Speer.

DEFENDANT SPEER: Mr. President, may it please the Tribunal: Hitler and the collapse of his system have brought a time of tremendous suffering upon the German people. The useless continuation of this war and the unnecessary destruction make the work of reconstruction more difficult. Privation and misery have come to the German people. After this trial, the German people will despise and condemn Hitler as the proved author of its misfortune. But the world will learn from these happenings not only to hate dictatorship as a form of government, but to fear it.

Hitler's dictatorship differed in one fundamental point from all its predecessors in history.

His was the first dictatorship in the present period of modern technical development,

a dictatorship which made a complete use of all technical means in a perfect manner for the domination of its own country.


Through technical devices like the radio and the loudspeaker, eighty million people were deprived of independent thought. It was thereby possible to subject them to the will of one man. The telephone, teletype and radio made it possible, for instance, that orders from the highest sources could be transmitted directly to the lowest ranking units, by whom, because of the high authority, they were carried out without criticism. From this it resulted that numerous offices and headquarters were directly attached to the supreme leadership, from which they received their sinister orders directly. Another result was the far- reaching supervision of the citizens of the State and the maintenance of a high degree of secrecy for criminal events.

Perhaps to the outsider this machinery of the State may appear like the cables of a telephone exchange - apparently without system. But, like the latter, it could be served and dominated by one single will.

Earlier dictators during their work of leadership needed highly qualified assistants, even at the lowest level, men who could think and act independently. The totalitarian system in the period of modern technical development can dispense with them; the means of communication alone make it possible to mechanize the lower leadership. As a result of this there arises the new type of the uncritical recipient of orders.

We had only reached the beginning of the development. The nightmare of many a man that one day nations could be dominated by technical means was all but realized in Hitler's totalitarian system.

Today the danger of being terrorized by technocracy threatens every country in the world. In modern dictatorship this appears to me inevitable. Therefore, the more technical the world becomes, the more necessary is the promotion of individual freedom and the individual's awareness of himself as a counterbalance.

Hitler not only took advantage of technical developments to dominate his own people - he nearly succeeded, by means of his technical lead, in subjugating the whole of Europe. It was merely due to a few fundamental shortcomings of organization, such as are typical in a dictatorship because of the absence of criticism, that he did not have twice as many tanks, aircraft, and submarines before 1942.

But if a modern industrial State utilizes its intelligence, its science, its technical developments and its production for a number of years in order to gain a lead in the sphere of armament, then, even with a sparing use of its manpower, it can, because of its technical superiority, completely overtake and conquer the world, if other nations should employ their technical abilities during that same period only on behalf of the cultural progress of humanity.

The more technical the world becomes, the greater this danger will be, and the more serious will be an established lead in the technical means of warfare.

This war ended with remote-controlled rockets, aircraft with the speed of sound, new types of submarines, torpedoes which find their own targets, with atom bombs, and with the prospect of a horrible kind of chemical warfare.

Of necessity the next war will be overshadowed by these new destructive inventions of the human mind.

In five to ten years the technique of warfare will make it possible to fire rockets from continent to continent with uncanny precision. By atomic fission it can destroy one million people in the centre of New York in a matter of seconds with a rocket manned, perhaps, by only ten men, invisible, without previous warning, faster than sound. Science is able to spread pestilence among human beings and animals and to destroy crops by insect warfare. Chemistry has developed terrible weapons with which it can inflict unspeakable suffering upon helpless human beings.

Will there ever again be a nation which will use the technical discoveries of this war for the preparation of a new war, while the rest of the world is employing the technical progress of this war for the benefit of humanity, thus attempting to create a slight compensation for its horrors?

As a former minister of a highly developed armament system, it is my last duty to say the following:

A new large-scale war will end with the destruction of human culture and civilization. Nothing prevents unconfined technique and science from completing the work of destroying human beings, which it has begun in so dreadful a way in this war.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Davos Daily: Big Data, privacy and the huge opportunity in the monetization of trust
"Legislation must be passed in sleeping countries like the United States before they find out how we plan on using this information against the citizenry. We can use the idea of security and protection of children to divert the general public of sleeping countries before they realize that the legislation will cause more security concerns and will leave the children without any safety whatsoever."

http://forumblog.org/2012/01/davos-daily-big-data-privacy-and-the-huge-opportunity-in-the-monetization-of-trust/
By: Michael Fertik Jan 25th 2012

Michael Fertik, CEO and Founder, Reputation.com, opens the blog series with “Big Data, Privacy and the Huge Opportunity in the Monetization of Trust”, which is an issues that will also be in the heart of many of the discussions taking place this week.

We all know that Big Data has arrived. (Living in the Big Data world, I hear the phrase “Big Data” so much that I now sometimes say that Reputation.com isn’t a Big Data company, it’s a HUGE Data company.)

But after the arrival of Big Data, then what? The big question is not “Do you have or want Big Data?” or “Does the Big Data idea matter?” Big Data is here whether you are ready or not, and it is forcing structural changes to the way data is collected and used.

The important question now — which is being taken up at several sessions on innovation, privacy, responsibility, and risk here at the Annual Meeting in Davos, is “What are you going to do with your Big Data?”
There are two components to a structural answer to this question.

First, it is imperative to protect the data. In the age of growing cyber attack, the need to safeguard data may seem obvious at first. But in this case, I mean more than protecting information from leakage or hacking. I am talking about the value of making sure your customers’ data are not used in ways your customers did not reasonably expect. As has been noted many times before elsewhere, companies in certain industries have fundamentally relied on their users’ ignorance for how their data were being exploited. Indeed, many of the companies who sold (or shared or otherwise transferred) data about their users have been, and remain, accidentally ignorant themselves as to where customer information ends up after it departs their own servers. Securing data successfully in the future will require knowledge and transparency – on the part of both end users and the companies that hold their information – as to where the data have been and where they are heading. A structure based on trust and transparency will allow productive new uses of data, which brings me to my second point.

Second, it is necessary to consider how best to use the data once they come into your possession. We can now easily envision a better alignment of interests between companies holding data and the customers and end users whose data they hold. Under the old system, companies that acquired data used it almost entirely for their own benefit, often at the price of consumer dissatisfaction. But, using today’s technology, it is possible for a company that holds vast quantities of end user data to mine and monetize it simultaneously for itself and the individual consumer. (Full disclosure: my company, Reputation.com, helps companies and end users [http://www.youtube.com/watch?v=fg1SpUgKTpk in just this way.)

For example, existing technology allows businesses to offer end users discounts, status and even cash in exchange for delimited third-party access to their data. The enterprises that stand to gain most from this type of business model are financial institutions, ISPs and telecommunications companies: they possess huge consumer data sets but have been regulated away from using the data in the same way that media businesses, especially Internet media businesses, are already using data the data every day. These companies can unlock huge value in collaboration with their end users: the companies and consumers together can actually monetize the latent value of their data and even, in some way, of their mutual trust, perhaps through the medium of a trusted privacy intermediary.

The theme of this year’s Annual Meeting is The Great Transformation: Shaping New Models.  Nothing could more apt than innovation in the field of data, trust, and reputation.  This week at Davos, key stakeholders from business and policy are engaging in robust discussion about realizing the promise of this new source of value for businesses and consumers.

This week at Davos, key stakeholders from business and policy are engaging in robust discussion about realizing the promise of this new source of value for businesses and consumers.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Davos Tells World Economic Forum Participants that Anti-Privacy Data Legislation Could Create a New Form of Currency
Speakers Explain How the Theft of Private Data from the Citizenry of the Participating Countries Could be used as Collateral to Appease International Bankers Holding Ponzi Scheme Style Debt Over the Heads of Member-States

http://gigaom.com/cloud/davos-does-data/
By Barb Darrow Jan. 26, 2012, 6:20am PT 2 Comments


Big data has gotten very big if the talking heads at the World Economic Forum in Davos, Switzerland, are talking about it. And they are talking about it.

The big data phenomenon refers to the explosion of data of all types — location coordinates churned out by cell phones and GPS, machine data from manufacturing gear, consumer data from Twitter and Facebook. Just a fraction of that information resides in traditional databases. It’s not only too much to get one’s head around but also overwhelms traditional database and analytics tools, giving rise to a new generation of computing technologies: the Hadoop data framework, NoSQL databases and big data analytics.

The overriding issue is finding the right data, applying the right analytics to it, and letting it deal with real-world problems. And the World Economic Forum’s elite attendees, including prime ministers, corporate titans and star academics, purport to address the biggest of big problems: climate change, the income gap, food inequality, public health crises, Iran.

One session, titled “Decoding the data deluge,” chaired by Jan Hesthaven, a professor of applied mathematics from Brown University, deals with the upside opportunity these huge data sets can enable.

From the course description:

It’s a funny thing about data: If you look up ‘data’ in the literature, it invariably comes laden with negative baggage – words such as ‘overload’ and ‘deluge’. With terms such as these, no wonder scientists and scholars alike shy away! But instead of resisting large data sets, we should be embracing them. Multinational companies are learning how to work with large data sets, and they’re getting better at it all the time. But mid-size and smaller businesses don’t have that expertise. Yet the largest companies will benefit greatly if smaller businesses, many of them key to their supply, production and workforce, can, too, handle massive data. Such ease of data handling can grease the wheels of global commerce.

That is just one of several sessions touching on the topic. Another, “Personal data: the ‘new oil’ of the 21st century,” dealt with the proliferation of personal data generated by new intelligent devices, networks and software and how to build a personal data ecosystem that will “spur economic and societal value without undermining privacy and civil liberties.” Another session, “Convergence on the go,” attacked the consolidation of data voice, video and cellular communications services and its impact on society.

There is also a report, Big data, big impact: new possibilities for international development,” which outlines the impact the collection and proper application of big data can have on financial services, education, agriculture and health care.

According to the report:

Data collected through mobile devices, whether captured by health workers, submitted by individuals, or analysed in the form of data exhaust, can be a crucial tool in understanding population health trends or stopping outbreaks. When collected in the context of individual electronic health records, this data not only improves continuity of care for the individual, but it can be used to create massive datasets with which treatments and outcomes can be compared in an efficient and cost effective manner.

Big data is good, except when it’s bad

All of this discussion in the Alps is happening at a time when the opportunities of big data also raise privacy concerns that are playing out internationally, as discussed by GigaOM’s Derrick Harris here.

The issue of who owns what data is huge, and there are factions fomenting to wall off data because of political concerns. Telcom powers in France and Germany, for example, want to build homegrown data centers that would be impervious to U.S. law enforcement requests for customer data. Their concern is that the U.S. Patriot Act can force U.S. companies running cloud-computing sites in Europe (or elsewhere) to turn over customer data if U.S. authorities suspect terrorist activity. That means American IT powers like Microsoft, Amazon and Google that run cloud operations out of European data centers could be compelled to disclose this information. That specter led some European entities to eschew cloud computing services from U.S. companies. In December, British defense contractor BAE backed out of a Microsoft Office 365 deal, citing this issue.

On Jan. 18, U.S deputy attorney general Bruce Swartz tried to calm the waters, saying that the Patriot Act does not supercede existing international trade agreements. A few days later, the Electronic Freedom Foundation, an advocacy group, debunked Swartz’s claim:

While the DOJ may spin its position one way to try to appease foreign audiences, its actual position is quite clear where it really matters: in US courts when it is trying to access subscriber information held by US-based cloud computing services. Indeed, the DOJ’s position in its court filings is that very little, if any, privacy protection is available against US government access to the records of users of US-based cloud computing services.

Whatever happens in this data privacy and protectionism battle, it is clear that big data is very big indeed. Maybe too big. Big data has been featured in recent issues of mainstream publications including Esquire. A contrarian might say this mainstream hype could also mean the big data bubble is about to burst.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
DAVOS EXPLAINS THE NEW WORLD ORDER OBJECTIVE:
GLOBAL CONTROL OF SOCIETY THROUGH THE THEFT, STORAGE, AND ANALYTICS OF PRIVATE AND PERSONAL DATA

http://www.weforum.org/content/davos-2012-decoding-data-deluge

As a global society, we face a host of major challenges – whether it’s dealing with climate change, seeking new sources of energy and security, curing cancer or lifting billions of our fellow humans out of poverty. There are thousands of people engaged in solving these problems, in scores of laboratories and research centers around the globe. They are generating large amount of data about the issues at hand; yet we find ourselves at a juncture where we have so much data that it’s created a bottleneck. We’re faced with a classic needle in a haystack problem – finding the data that are most useful. We struggle to determine which data we can share and how to share it. We struggle with understanding how data can open new questions for us to pursue.

This is our bold, new world– a world on the cusp of data-driven research, innovation and discovery. At the World Economic Forum in Davos, we will talk about the challenges of working with large data sets, and the nearly limitless opportunities that big data present to addressing societal issues that know no borders. We will talk about how effectively sifting through massive data can help the societies of today preserve the civilizations of yesterday. We will talk about how decoding data can help scientists share information from a single, hard-to-find specimen, making new discoveries more possible and frequent. We will talk about how understanding big data can yield advances in the study of the human brain, offering the prospect, perhaps someday soon, of a once-paralyzed child moving as freely and effortlessly as any other.

It’s a funny thing about data: If you look up “data” in the literature, it invariably comes laden with negative baggage – words such as “overload” and “deluge”. With terms such as these, no wonder scientists and scholars alike shy away! But instead of resisting large data sets, we should be embracing them. Multinational companies are learning how to work with large data sets, and they’re getting better at it all the time. But mid-size and smaller businesses don’t have that expertise. Yet the largest companies will benefit greatly if smaller businesses, many of them key to their supply, production and workforce, can, too, handle massive data. Such ease of data handling can grease the wheels of global commerce.

To realize this vision, data and data awareness needs to be integrated into the educational curriculum. We need to teach students how to use massive amounts of data, in higher-education curriculums and even at secondary-school levels. Our educational focus must change, or our children won’t be prepared to handle the vast amounts of data that they invariably will encounter every day.

Data creates a bridge between traditional disciplines, spawning discovery and innovation from the humanities to the hard sciences. Data dissolves barriers, opening up new channels of communication, lines of research, and commercial opportunities. Data will be the engine, the spark to create a better world for all.

Jan Hesthaven, professor of applied mathematics at Brown University.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
"Infrastructure Protection" is justified/w False Flag Effects Based Operations
http://www.sovasec.com/2009/06/15/

June 15th, 2009

CyberWar is a Racket
Monday, June 15th, 2009

Inspired by ‘War is a Racket’ by Maj. Gen. Smedly Darlington Butler U.S.M.C

Under the threat of war, the cost of defense is never too high.
A nation is under significant obligation to protect its investments where ever they may be.
What we see now, is the transition from physical to electronic defense.


The United States is returning to Cold War status. In preparation for this the advancement of technology and the power of the intelligence community is of the foremost importance. In order to maintain a position of dominance, the government must sustain its partnership with wartime industry. Through a metamorphosis of the “military industrial complex”, into a new “intelligence industrial complex”, this accomplishment can be witnessed. The ever present fear of terrorism will still be used as justification for sustained engagement. The new terrorist threat comes from what the media refers to as hackers.

The United States’ trade deficit is in the trillions of dollars. The nation must possess assets for which they use to back the value of money sent overseas. China, for example, has accumulated a surplus of US currency. The deficit exists due to the lack of goods being sold in return. These dollars are then stockpiled or used to buy fuel. The oil cartel uses this petro-dollar as the international rate of exchange. There is already discussion to take the world off of this standard. The dollar has already been abandoned in places where once it was used it as a common currency. The United States needs to be ready to compete in the global market, or in default will continue to forfeit property as payment. If the international oil standard were to shift from the dollar, the American economy could be crushed. Places like China would have no reason to continue accepting currency from the United States as a form of trade. In order to continue doing global business, and maintain the standard of living for most Americans, the United States would need to find an acceptable financial solution. It would be necessary to provide a product or service which can be sold on the international market.

With a shift of strategy by the public-private sector, there is the beginning of what could be a record breaking transition. The same corporations, agencies, and institutions which traditionally have been government contractors understand this move, and are shifting production accordingly. International finance, which in the past has funded one or more sides of various conflicts, is already buying into this new deal. With the new President and his many supporters, the official war should be concluded soon. Although there will always be justification for troops stationed around the globe, much funding for war expenses would no longer be necessary.

The companies which produced the equipment, supplied the fuel for the machinery, and paid the workers, would be looking at a massive drop in revenue.  To compensate they will begin to offer services in line with the new focus on infrastructure protection. War profits can be an increase of 7856% over peace time.

That is a real historical figure of seven-thousand eight-hundred and fifty-six percent. Profit is the only motivation for the existence of a corporation. Existing funding could be redirected towards new projects and a new war.

A nation needs a real or fabricated threat to justify taxation to its people, for the necessity of its defenses.

In Orwell’s 1984 we saw Emmanuel Goldstein as the fictional ‘enemy of the people’. The character was a phantom used to justify the actions of the state. Some would say there is a modern analogue to the Goldstein character.

It is claimed that Tim Osman, in only 30 years, was partly responsible for the near collapse of not one, but two world empires. He has never been permanently detained despite a concerted global effort. In fact, he taunts the world by sending recordings of himself to media outlets, which use his image as a rallying symbol of fear comparable to Orwell’s construct. It is hard to imagine how a person in need of regular medical attention, can evade the worlds most advanced intelligence gathering network, and continue to avoid capture.

A sufficiently disruptive electronic attack would be an excellent pretense to create a new phantom enemy.


Sophisticated attacks on domestic infrastructure by unknown foreign entities, could easily be sold to the people as ‘the cost of war hitting home’, against enemies which must be defeated ‘at any cost’. Create a little fear, combined with nationalism, and a popular charismatic leader, and one can accomplish almost anything through the mob mentality.

Operation Cyberstorm has introduced us to the next generation of hypothetical threats.

These new terrorists are individuals and groups of technically skilled people. United by a popular voice of dissent, these groups have formed a loosely knit alliance with a common goal of disrupting the global economy. There are individual actors, the known unknowns, who may assist and possibly increase the severity of an electronic attack. To defend the global financial system and domestic infrastructure, the federal government partnered with private industry, and is spear heading the effort to crack down on criminal activity within these groups. It is not an eAl-Queada, or the iTaliban, the new terrorists are hackers. They are the poltergeist in the machine, whenever there is a disruption in internet service, or a random power outage, or any other system the public has come to depend on is interrupted, there will be the suspicion and speculation as to the root cause. If a server catches fire in Phoenix, or suzie1865 can not get to her mytwitterface account, someone is going to cry wolf. When this occurs the justification for more funding is shown to be necessary, the cycle of funding continues. Operation Cyberstorm was not focused on international state sponsored crime, or independent groups of foreign nationals conducting espionage. Though these are the fears represented in the recent legislation and government reviews.

The very intangible nature of cyber-bogeymen provides the vagueness needed to justify any measure of prevention, or manner of retaliation.


It is possible that we could see the war funding re-purposed for the improvement of infrastructure, the advancement of technology, and the defense of communications networks. These billions of dollars will continue to flow into the same hands.

The nature of security allows the defender to only divulge knowledge when it is to their advantage. The knowledge of potential threats, or even past incidents, is just another form of information which could be released for profit. When the industry shifts from traditional combat to electronic engagement, the resources allocated would create a world class institution. The heavy corporate involvement will open up the opportunity for those holding a large number of dollars to trade them in. The sale of data, proprietary and patented new technologies, and accompanying services, would create an outlet for stockpiled petro-dollars.

However this is not the end of physical combat. With industry there is the necessity for natural resources, the foreign and domestic sources of these materials would continue to require physical protection. To prevent against supply line attacks involving sabotaged materials, increased international oversight would be required at these facilities, which produce today’s high-tech components. Government contractors will supply both electronic and physical security to protect their assets. Tax money is used to fund corporations which are not interested or obligated to protect people’s rights. By partnering with the private sector, the government has relieved itself of much responsibility to the people. This responsibility is transferred to the private sector, which only has the single minded goal of increasing its own profit. This could explain why corporate representatives testify before congress to the need for the very services they provide. The agencies which use their services sit alongside them in agreement. This gives the illusion of a clear and present threat which must be eliminated as soon as possible.

The corporations are lined up with their hands out for increasingly larger slices of the federal pie. Sadly, with the lack of resistance and competition, there will be no organic incentive for innovation. Like a pack of wolves they will only destroy each other fighting over the scraps. Those who rely on the contracts to continue operation are forced into compliance for their ration, forever submitting to the alpha of the pack.

The market would not be free, and likely would eventually create a situation where it will be too hollow to support itself and collapse, leading to a very real threat to national security.

On the other hand there is a great risk for the continued creation of a technocratic fascist state. In which we would see constant and holistic surveillance to protect against foreign or domestic threats, among which the government themselves admit, is public dissent.

America was founded on the principle of dissent against tyranny. It is a patriotic duty to question the motivations of government. Technology can be the key that sets us free, or the yoke under which the many exist to serve the few.

With the end of the war, the media will further turn its attention to programming which numbs the mind. Without the constant reminder of the hellish nature of war the protesters will slowly go away. When the international terrorist computer criminals allegedly cripple some piece of critical infrastructure, and the justification for increased spending be comes a reality, the new victims of war will not draw the public sympathy as do dead and dieing solders in the field. When the power grid is compromised, or restrictions are placed on internet usage, even the anti-war crowd will stand behind the government looking for justice against the terrorists, which have caused their inconvenience. The intelligence assurance community, a government and corporate body, would expand as protectorate of the national electronic infrastructure.

Anyone who operates critical equipment, including networks of computers, will be biometricly catalogued. Some existing uses, of similar government systems, also employ operators in real time remote connection monitoring, as a security measure to ensure the validity of the information transfer, and that standard protocols are being observed. Most domestic communications are intercepted and recorded by the intelligence agencies at various points in the network. Private companies index this information, protecting it from Freedom of Information Act requests. Like so many baseball cards, profiles are bought, sold, and traded.

Information is the new currency.

The data centers are the new vaults, the processing facilities the new banks. Where there are banks there will always be robbers. Where there are robbers there will always be lawmen to make pursuit. In their way are things like privacy, the Constitution, and international boundaries.

The intelligence agencies are more then willing to put themselves above the law when it suits them. Their collaboration with the private sector gives them special access to infrastructure, which they have already shown the willingness to abuse.  Unlike land, gold, and oil, persons and their information are renewable resources, so this new market has infinite growth potential.


Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA Would Allow Big Corporations to Steal All Your Data
http://www.policymic.com/articles/7629/cispa-would-allow-big-corporations-to-steal-all-your-data/related

CISPA is another attempt by corporate entities to obtain access to governmental intelligence sources on the Internet. That’s what the fuss is all about. The full text of the bill can be found here.

This bill talks about sharing governmental intelligence information with “certified entities,” but the only requirement to become a certified entity is to demonstrate that you can keep a secret. It doesn’t seem to be necessary that you prove a national security position for your company.

While the bill does talk about not using the information to gain a competitive edge on one’s competition, it is an unenforceable clause. If you have information that gives you a competitive edge, then you automatically have a competitive edge and possession of that information will alter an entity’s activities. It would be foolish to think that anything else could happen.

Another gaping hole in this bill is the failure to define what type of information might be considered as a security threat. For this reason, CISPA essentially opens up all of the information anywhere on the web to the prying eyes of not only the government, but also , for instance, multinational corporations.

As just one example of why this is a problem, if you happened to develop a device that would cut the oil consumption of the U.S. in half, and you submit it for patent via the internet, that submission can be classified as security sensitive, passed on to a corporation with ties in China, and your device could be manufactured there before it gets through the patent process here, which will negate your patent application.

While I have a great deal of apprehension about the kind of intelligence already being gathered by our government, I truly fear what would be done with that information in the hands of private corporations, or worse, multinationals.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA will not only make this legal, it will make it mandatory...video taping children in their homes, in their bedrooms, in their bathrooms, everywhere will be part of the videos that multinational corporations will get to view and act upon whenever they like. Corporations like Bin Laden Group and Monsanto will have 24/7 videos/audios of all your children to do as they please with...




School Forces Children to be Unsuspecting Stars in Clandestine Peadophile Reality Shows Where They Are Videotaped In their Bedrooms
http://news.cnet.com/8301-17852_3-10460729-71.html
by Chris Matyszczyk  February 26, 2010 3:35 PM PST

"This kid looks like they're editing their MySpace page." So declares an assistant principal at Intermediate School 339 in the Bronx borough of New York, a "former technology coach" (PDF) named Dan Ackerman (but not to be confused with CNET's Dan Ackerman). You might imagine that he's wandering around a classroom looking over kids' shoulders as they fiddle about on their laptops. You might imagine, then, that storks deliver milk as well as babies. This remarkable 2009 footage from the PBS show "Frontline," promoted on its site earlier this month and thrust into the limelight on Thursday by the people at Boing Boing, might just make your own moral code offer a boing or two, as you view the apparent normality of a school administrator peeping into his students' lives through software installed on their school-issued laptops.

The entertainment begins at around the 4:30 mark. We watch him watching a girl comb her hair, using her Mac's Photo Booth application as a mirror. He then observes the editing of a MySpace profile page, reportedly via a program called Apple Remote Desktop, marketed as enabling teachers to "pause all of their [students'] screens, give them new instructions, and start them up again when [they're] ready."  Perhaps the most chilling line of the video, especially in the context of this week's revelations at Harriton High School in Pennsylvania--which allegedly used security software to surreptitiously activate a school-issued laptop Webcam when off-campus--is when Ackerman utters these words with almost a chuckle: "They don't even realize that we're watching."  They seem to realize something, though. As Ackerman demonstrates how he "always [likes] to mess with [students] and take a picture" by remote-controlling the Photo Booth software, a girl ducks out of shot.  "Nine times out of 10," Ackerman explains, referring to the moment Photo Booth indicates to the student that a picture is being taken, "they duck out of the way." And on occasion, according to "Frontline" reporter Rachel Dretzin, Ackerman interrupts students' instant-message conversations "with his own message, telling them to get back to work."



More Details Emerging About School Laptop Spying, And It Doesn't Look Good
http://www.techdirt.com/articles/20100222/1118438253.shtml
from the a-bit-proud-of-your-spying... dept

Following up on this morning's post, new details are emerging about the school spying scandal in which a student was punished for apparently chowing down on Mike&Ike candy (which the school thought were drugs). In our comments, someone named Paul points us to a blog post from a security consultant, who digs much deeper into the story -- focusing on one of the techies who worked at the school and apparently had a noticeable internet presence, having said a few things that could come back to haunt him. Note, that the school itself has said that only two techies on staff had the power to initiate the use of the remote spying tool.

Apparently, in various forums, blog posts and videos, one of the school's techies talked about the technology they were using and how to set it up so that the user would not realize they were being spied on. He also discussed how to prevent a laptop using this software from being "jailbroken," so users couldn't discover that their computers were being used in this manner. Other forum posts from students at the school show that they were told they could not use other computers, could not disable the cameras and could not jailbreak their laptops on the risk of expulsion. Furthermore, in looking at the software that was being used, the security consultant found serious security problems with it, in some ways similar to the famed Sony BMG rootkit:

With some of my colleagues, I began a reverse engineering effort against LANRev in order to determine the nature of the threat and possible countermeasures. Some of the things we found at first left us aghast as security pros: the spyware "client" (they call it an agent) binds to the server permanently without using authentication or key distribution. Find an unbound agent on your network with Bonjour, click on it, you own it. The server software, with an externally facing Internet port... runs as root. I'm not kidding. For those unfamiliar with the principle of least privilege- this is an indicator of a highly unskilled design. Unfortunately, when we got down to basic forensics, LANRev appears to cover its tracks well.

Things keep looking worse for the school, and school officials have done little to actually explain what happened, if the prevailing story is not actually the case.



Mandatory Surveillance of All Children in their Bedrooms With All Videos Sent to Unknown Locations
http://strydehax.blogspot.com/2010/02/spy-at-harrington-high.html
Sunday, February 21, 2010

This investigation into the remote spying allegedly being conducted against students at Lower Merion represents an attempt to find proof of spying and a look into the toolchain used to accomplish spying. Taking a look at the LMSD Staff List, Mike Perbix is listed as a Network Tech at LMSD. Mr. Perbix has a large online web forum footprint as well as a personal blog, and a lot of his posts, attributed to his role at Lower Merion, provide insight into the tools, methods, and capabilities deployed against students at LMSD. Of the three network techs employed at LMSD, Mr. Perbix appears to have been the mastermind behind a massive, highly effective digital panopticon.

PanoMasterMind

The primary piece of evidence, already being reported on by a Fox affiliate, is this amazing promotional webcast for a remote monitoring product named LANRev. In it, Mike Perbix identifies himself as a high school network tech, and then speaks at length about using the track-and-monitor features of LanRev to take surreptitious remote pictures through a high school laptop webcam. A note of particular pride is evident in his voice when he talks about finding a way outside of LANRev to enable "curtain mode", a special remote administration mode that makes remote control of a laptop invisible to the victim. Listen at 35:47, when he says:

"you're controlling someone's machine, you don't want them to know what you're doing" -Mike Perbix

It isn't until 37 minutes into the video till Perbix begins talking about the Theft Tracking feature, which causes the laptop to go into a mode where it beacons its location and silent webcam screenshots out to an Internet server controlled by the school.


The beacon feature appears to have been one of the primary methods for remote spying, however, network footprints abound over the details and architecture of the remote administration effort. In this post, Perbix discusses methods for remotely resetting the firmware lockout used to prevent jailbreaking of student laptops. A jailbreak would have allowed students to monitor their own webcam to determine if administrators were truly taking pictures or if, as the school administration claimed, the blinking webcams were just "a glitch."

Perbix also maintains a prolific blog, where in this blog post he describes using the remote monitoring feature to locate a stolen laptop:

"As a prime example, we initially attempted to recover a stolen laptop that reported back to us it's internet address and DNS name. The police went to the house and were befuddled to find out the people we knew had the laptop was not the family that lived there...well, we eventually found out that they were the neighboring house and were borrowing the unsecured WI-FI."

In a September 2009 post that may come to haunt this investigation, Perbix posted a scripting method for remote enable/disable of the iSight camera in the laptops. This post makes a lot more sense when Perbix puts it in context on an admin newsgroup, in a post which makes it clear that his script allows for the camera to appear shut down to user applications such as Photo Booth but still function via remote administration:

"what this does is prevent internal use of the iSight, but some utilities might still work (for instance an external application using it for Theft tracking"  

What's the purpose of shutting down a camera for the user of the laptop but still making it available to network administrators? Ask yourself: if you wanted to convince someone that a webcam blinking was a glitch, would disabling the cameras help make your case?

We Found the Glitch, Mrs. Buttle

The truly amazing part of this story is what's coming out from comments from the students themselves. Some of the interesting points:

-Possession of a monitored Macbook was required for classes
-Possession of an unmonitored personal computer was forbidden and would be confiscated
-Disabling the camera was impossible
-Jailbreaking a school laptop in order to secure it or monitor it against intrusion was an offense which merited expulsion


When I spoke at MIT about the wealth of electronic evidence I came across regarding Chinese gymnasts, I used the phrase "compulsory transparency". I never thought I would be using the phrase to describe America, especially so soon, but that appears to be exactly the case. On a familiar note, the authorities are denying everything. As one reads comments on this story, a consistent story begins to emerge:

"My name is Manuel Tebas. I was a student at Harriton High School, in the graduating class of 2009. We were the first year on the one-to-one laptop initiative. [...] I saw your post about removing webcam capability from the Macbook. It is possible - I did it last year. I will preface this by saying that when I did it, I was almost expelled, saved only by the fact that there was, at the time, no rule against doing so."

"I remember that the laptop was a requirement in school for many classes. That may remain so."

" had brought in my own personal computer to work on a project for school one day. I was doing a presentation involving programs not available on the regular computers, only in specific labs. I happened to have a copy of my own. My personal property was confiscated from me in a study hall when I was working on a school assignment because it was against the schools 'code of conduct'."

"Hi, I'm a 2009 Graduate of Harriton Highschool. [...] I and a few of my fellow peers were suspicious of this sort of activity when we first received the laptops. The light next to the web cam would randomly come on, whether we were in class, in study hall or at home minding our own business. We reported it multiple times, each time getting the response: "It's only a malfunction. if you'd like we'll look into it and give you a loaner computer."

"The webcam could NOT be disabled due through tough tough security settings. Occasionally we would notice that the green light was on from time to time but we just figured that it was glitching out as some macbooks do sometimes. Some few covered it up with tape and post its because they thought the IT guys were watching them. I always thought they were crazy and that the district, one of the more respectable ones within the state, would never pull some shit like this. I guess I was wrong."

"I am the father of a 17 y/o Harrington High student. She has had one of these laptops for 2 years. She has noticed the "green light" coming on but was not computer literate enough to know what initiated it"

Browse as many web forums as you like, the comments above are highly representative. Students were told green webcam activation lights going off at home were a glitch, were required to use a jailed computer, were threatened with expulsion if they attempted to jailbreak the computer to find the truth, and were not allowed to use computers they controlled.

Inside LANRev

With some of my colleagues, I began a reverse engineering effort against LANRev in order to determine the nature of the threat and possible countermeasures. Some of the things we found at first left us aghast as security pros: the spyware "client" (they call it an agent) binds to the server permanently without using authentication or key distribution. Find an unbound agent on your network with Bonjour, click on it, you own it. The server software, with an externally facing Internet port... runs as root. I'm not kidding. For those unfamiliar with the principle of least privilege- this is an indicator of a highly unskilled design. Unfortunately, when we got down to basic forensics, LANRev appears to cover its tracks well. Here's a screenshot of the server application monitoring a tracked host:

Tracking intervals available at the top; screenshots and webcam shots in the lower right pane. No webcam shot is visible here as a webcam was not connected during testing  In order to spy on my computer, I had to mark it for spying. The icon for spying is a detective hat and a magnifying glass; very Sherlock Holmes. Once I had the agent installed, I used dtrace to monitor its activity as it hung around and spied on my system. The log below is an edited trace of the agents activity during a spy interval. It uses a fixed dump point, /tmp/Image, as its save file before uploading to the server, sadly this is wiped. Only a full forensics scan which picks up deleted files will have a chance of picking up the history of the spying on a particular computer. On laptops with a webcam, a second fixed save point, /tmp/Image1, is used to save the webcam pic.

For the technically inclined, I've highlighted some of the key points, use of the system screengrabber, the use of RawCamera, the fixed save point, etc. We're still working on our technical writeup of this software and hope to update soon.  During our testing, we infected a laptop with LANRev, then closed the lid, hoping to activate the LANRev feature which takes a webcam picture when the computer wakes. As my colleague Aaron opened the lid of his Mac, the green webcam light flickered, ever so briefly. It wasn't a glitch. It was a highly sophisticated remote spy in his system. And even though he was in control, the effect was still very creepy. Here's one last capture from the Windows version of the administration console, showing a forced remote webcam snapshot. We've pixellated this, but rest assured the real thing looks very detailed

In other news on the case, subpoenas have been issued, the FBI is on the case, the candy in question has been caught red-fingered, and some enterprising chap is ready to cash in with a t-shirt. Doug Muth's hands on screenshots provide the best first hand encounter with the client end of the spyware in question. What amazes me most is that the family and lawyer filing the suit appear to have done no digital forensics going in, and no enterprising student hacker ever jailbroke a laptop and proved this was going on. The greatest threat to this investigation now is the possibility that the highly trained technical staff at LMSD could issue a LANRev script to wipe digital forensic evidence off all the laptops. This is why it is imperative for affected parents to have the hard drive removed from their children's laptops and digitally imaged before the laptop is connected to a network. With enough persistence, and enough luck, we may eventually learn the truth.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
This would all be legal under CISPA, actually it would be incentivised...the more slaves you own, the more benefits the multinational corporations will ive you.

***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves


Christopher Clark, Fmr Officer in Department of Homeland Security
Used IBM Electronic Dog Collars to Create a Sex Slave

http://www.courthousenews.com/2010/08/31/29997.htm

"Clark also wanted to see how good plaintiff's tongue was and that he was attracted to the plaintiff," according to the complaint. Dahl claims Clark traveled to Montana on Aug. 8 "under the guise of an official business trip" and asked her to meet him. She says he made her feel "that she did not have a choice but to do whatever he suggested or he would fire her." That night Clark took her back to his hotel room "where he demanded to have sex and forced himself on her and, after initially attempting to fight him off, she gave up and he had his way," the complaint states. It adds: "The sex was not of her free will and was unwelcomed." A week later, she says, Clark e-mailed her the lyrics to Jimmy Buffett's song "Come Monday" and wrote about "loving" her. Dahl claims Clark met her in Minneapolis to join her for her move to Washington and "demanded sex" on each of the four nights they spent on the road. Once in Washington in her new job, she says she tried to refuse to have sex with him, but "Clark exhibited an attitude including body language which conveyed that he was entitled to have sex with the plaintiff if she wanted to maintain her job and it so scared the plaintiff that she backed off her stance and even suggested make-up sex."

Clark also monitored her in Washington, "particularly her movements and communications with other people and he sought to restrict, insulate and isolate the plaintiff so as to maintain and continue his control and dominion over her," she claims. "There was an expectation that the plaintiff would be providing Clark sex and he treated the plaintiff as if she was his sex slave," the complaint states.




“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”
https://www.mega.nu/ampp/privacy.html
-Zbigniew Brzezinski




Hey DHS...what you are doing right now is so f**king illegal it is not even funny. You guys have gone so far off the reservation, you are creating actual damages to humanity. Same as the Nazis did, same as Mao did, same as Pol Pot did. Wake up and realize what is going on. In the end they will turn the grid on you too. It is in the plans. IBM's system will require no humans, it will be sense and response without any human intervention. You are giving IBM all the data it needs to put the same electronic dog collar that psychopath used automatically. They will not need 500 humans in a room looking at computer screens. You are logging everything you think is suspicious. That is getting fed into IBM's analytics so that they no longer need you. It works on the same principals as Google's Human Tabulation Workshop. Watch this video and you should be able to see what you are doing for the beast behind the scenes: http://video.google.com/videoplay?docid=-8246463980976635143

And of course the psycho used the system to create a continually monitored and stalked sex slave. This was by design, it is so easy to do at that level and there is no oversight so of course he decided to get himself a sex slave, his profile probably showed he would do it, that is why he was hired. Don't you guys notice the type of people hired as your co-workers? Doesn't it freak you the f**k out sometimes?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA is necessary for IBM to get out of trillions of violations of thousands of privacy violations which renders their liability in the tens of trillions of dollars. This is a bailout of all the Nazi Corporations like IBM/Target/GE who have been illegally stealing billions of records and using them in Nazi-eque depopulation/enslavement planning. The Nazis spent years gathering intelligence before rounding up millions for mass extermination. IBM/CISCO/ATT/GE/Goldman Sachs need CISPA to protect them from their crimes against humanity

Check this out...original post from ekimdrachir. I have added comments and emphasis

http://news.teamxbox.com/xbox/19960/Rumor-New-Xbox-Console-in-2010-We-Tell-You-the-Truth/

so im looking for ibm video-based motion sensing and the first thing i get?

Digital Video Surveillance

http://www-935.ibm.com/services/us/gts/pdf/sp_wp_digital-video-surveillance.pdf

( and something is messing with my browser making links go elsewhere.. grr)

anyhow, Digital Video Surveillance:

enhancing physical security with analytic capabilities

by IBM global services 2008

Today’s Surveillance Challenges

In today’s environment, virtually every municipality, agency, educational institution, mass transportation center, financial institution, utility plant and medical center must plan for threats and protect the security of its property, employees, customers, citizens and IT infrastructure. Additionally, businesses in every sector face challenges in protecting their customers, employees, and assets while working to reduce operating costs, improve productivity and  increase profit as well as customer satisfaction. Examples of security risks and business issues that may be managed more effectively using surveillance methods include:

• Public Safety/Security: Increased threats have caused many government agencies to deploy surveillance cameras and sensors, providing situational awareness around critical facilities. School campuses must deal with pro- tecting entry and exit points, maintaining IT network security, preventing vandalism and avoiding authorization issues.

• Airports/Seaports/Railways: Mass transit businesses and agencies must protect passengers, staff, and physical assets from terrorist threats and security breaches, and adhere to regulatory requirements.

• Retail Stores: The retail industry monitors establishments to reduce fraud, theft, and administrative errors. Retail stores also use video and analytic information to determine the effectiveness of promotional displays and count people in various areas to optimize store layouts as well as sale effectiveness.

• Financial Institutions: Many banks have 24—hour human surveillance requirements for inside operations and Automated Teller Machines (ATMs). Surveillance and analytics are being used to reduce threats of robbery as well as fraud. Many banks are consolidating security controls across bank branches by monitoring video, voice and transactional information from a central command and control center.

An Evolution of Surveillance

Organizations have used surveillance for decades as a deterrent to criminal activities such as theft, fraud, and violence. In the last ten years, surveillance technology has been developed that not only helps organizations detect and respond to threats sooner, but also helps them focus on improving business operations. The three generations of surveillance are often described as:

• Analog
• Digital
• Smart or Intelligent

We will explore each of these in greater detail to help you better understand how we arrived at today’s environment and where we plan to go in the future.

Analog Video Surveillance

Video surveillance has typically involved the placement of analog video cameras in sensitive or strategic areas of a particular business, coupled with closed-circuit television (CCTV) for live monitoring. This serves not only as a deterrent to crime, but also to record the movement of people and property. Mobile methods of video surveillance, such as mounting cameras in patrol cars, buses and trains are also often utilized to record events. The use of analog video cameras results in the creation of hundreds of videotapes that then must be viewed by security guards. The cost of employing security personnel to monitor hundreds of cameras, in addition to storing a high volume of videotapes can be prohibitive. Additionally, videotapes can have poor image quality and deteriorate over time.

[A MAIN REASON FOR CISPA...TO HAVE AUTONOMOUS CONTROL AND FULL SPECTRUM ARCHIVING AND ANALYTICS ON ALL DIGITAL IMAGES ANYWHERE IN THE WORLD, SMART PHONES, LAPTOPS, DIGITAL CAMERAS, CCTV SSTEMS FULL VIDEOS WILL BE ADDED TO THE GRID WITH CISPA. IT IS NOW ILLEGAL TO DO THIS, CISPA GIVES THE MASSES THE IMPRESSION THAT IT WOULD BE LEGAL]
More importantly, studies have shown that a person assigned to sit in front of a video monitor for several hours a day and watch for particular events is an ineffective security system. Tests have demonstrated that after only 20 minutes of watching and evaluating monitor screens, the attention of most individuals has degenerated to well below acceptable levels.1 Monitoring video screens is both boring and mesmerizing. Furthermore, manual searches of tapes can take too long to provide vital information needed to assist in investigations. Also, video can often only be viewed from a single end point that is not shared. This limits the ability to distribute information across an enterprise, which could help minimize company-wide threats and alerts. Finally, analog video systems cannot extract business intelligence from security data.

Digital Video Surveillance

Today, video surveillance remains as vital as ever, but it assumes a new role. The emergence of digital video, IP video cameras, networked video recorders, web video, consumer cameras and video-based intelligence is opening up a wide range of applications providing enhanced functionality and business value to organizations.

Digital video surveillance (DVS) enables clients to establish effective risk management strategies that will help them manage and safeguard business information and technology assets, anticipate vulnerabilities and risk, and maintain timely access to information.

Many organizations have piecemeal solutions, and are challenged by having multiple systems that do not communicate with each other. Often, the separation of IT and physical security does not allow organizations to take advantage of existing IT infrastructures and applications, such as identification (ID) management and transactional systems that may already be in place. Operating totally separate, disparate systems for IT and physical security is not only less effective, but also more labor intensive and costly.

Figure 1. Digital video surveillance drives intelligence through integration, which can enhance your ability to respond.

Migrating to a DVS solution will help address some of the limitations of a tape-based analog system. DVS can help organizations achieve better returns on their security investments by:

• Enabling real-time detection and potential prevention of security incidents through enhanced intelligence gathering
• Using event-based viewing for investigative purposes, eliminating the need to chronologically review videotapes
• Reducing the need to monitor video cameras and change tapes
• Increasing product security by deterring potential shoplifters and monitoring staff
• Providing evidence against fraudulent claims
• Increasing indoor and parking lot security

Smart Surveillance

Smart surveillance, intelligent video surveillance, video analytics, intelligent video and intelligent analytics are typical names used to describe the concept of applying automated signal analysis and pattern recognition to video cameras and sensors, with the goal of automatically extracting “usable information” from video and sensor streams.

IBM Smart Surveillance Solution (SSS) helps optimize security by integrating hardware, software and services within an organization, thereby enabling the convergence of physical and IT security. An integral part of SSS is a software component developed by IBM Research known as IBM Smart Surveillance Analytics (SSA), which provides capabilities that enable real-time decision making and post-event correlation of people and activities.

Usage Scenarios

IBM Smart Surveillance Analytics has many unique features to help clients manage security issues and prevent problems before they occur, such as:

• Open framework—A comprehensive security and surveillance plan may involve multiple modalities of events captured from various video analytic technologies, non-video sensors and event systems like TLOG in the retail environment. SSA has been designed with an open framework that enables event-based surveillance and can make the integration of events simple and easy.

Behavior factory—Many vendors provide a set of behaviors, such as “large fast vehicle” and “stopped vehicle.” These behaviors have been designed with a limited customer set in mind. SSA’s ability to alert based on “database indexed metadata” of all events occurring across a series of camera feeds allows the user to customize behaviors to their environment through an easy-to-use interface.


Attribute search—The intelligent video industry has approached surveillance based on a limited set of known threat models; hence, the emphasis on “tripwires and abandoned objects” and very limited functionality to support investigation of “unknown threats.” SSA, through its unique and patent pending metadata search, supports a wide range of queries on events that may or may not have been previously defined as alerts. This is possible because SSA is capturing metadata on event activity, not just on pre-defined alerts.

AND THAT INCLUDES

• Entertainment solutions—The capability of SSA to track people can be used at sporting events to generate enhanced statistics, visualizations and interactive gaming. Clients that may be interested in this capability include casinos, sporting leagues and television stations.

IBM Smart Surveillance Solution Architecture
[IBM ELECTRONIC SLAVE COLLAR TO CONTROL HUMAN LIVESTOCK]


As stated above, the integral software component of SSS is IBM Smart Surveillance Analytics. The analytic framework of SSA is comprised of two core components: Middleware for Large Scale Surveillance (MILS) and Smart Surveillance Engine (SSE). They will be discussed later in this paper.

SSA provides the unique capability to carry out efficient data analysis of video sequences, either in real-time or recorded video. Based on open standards-based middleware, the open standards-based software platform is designed to allow monitoring and analysis of real-world events via sensors (like video cameras, radar or audio inputs). All SSA functionality is Web-based, allowing virtually

“anytime, anywhere” access

to both real-time and historical event data from the system.


Figure 2 shows the high-level conceptual architecture of IBM Smart Surveillance Solution. It illustrates how Smart Surveillance Analytics integrates with existing video cameras and capture systems to provide:

• Video/sensor analytics capabilities

• A framework for integrating event information from multiple related sources

• A framework for building client-specific solutions drawing upon the video and sensor events and integrating these into the client’s business process

Figure 2. IBM Smart Surveillance Solution—a conceptual architecture SSA provides the following types of functions to the end user:

Real-time alerts: Users can specify “alert definitions” that include multiple conditions from a single camera/sensor or across multiple cameras and sensors. SSA uses its analytics capabilities to evaluate events occurring in relevant sensors against the alert definition. Each time the “alert definition” is triggered, SSA can provide the user with prompt notification of the event.

User-driven queries: Users (both human and applications) can use SSA to perform content-based queries against event metadata that is archived by SSA. For example, SSA can retrieve all events from a camera where “a red car” was driving across the parking lot.

Figure 3. SSA Functionality

• SSA Functionality: There are several types of video analysis technologies that are part of SSA. Typically, each of these analytics involves sophisticated algorithms that process the video/sensor signals to extract information and structure the information to support the real-time alert and search functionalities of SSA. The video analysis technologies are:

– Behavior analysis: These analytics are intended to analyze the movement of objects within the field of view of a camera. This is based on the ability to detect and track multiple moving objects across the camera, classify these objects, and extract various object attributes like color, shape and size. The extracted information is used to provide a variety of alerts while recording information from all events (for example, motion detection, tripwire, abandoned object) and search functions (for example, find red cars).

– License plate recognition (LPR): This analysis capability is tailored to detect the presence of text within a given video frame, and apply optical character recognition technology to extract the license plate number. LPR needs to be customized to the character set (for example, English, Arabic), style, format and appearance of the license plate, which varies significantly across geographies. In order to correctly operate, LPR requires a minimum resolution across the license plate and adequate illumination and viewing angle.

– Face detection: This analysis capability is designed to automatically detect images of human faces from the video. The face detection capability creates an index in the video and marks the time at which the face was present in the video. The system generates a key frame to represent the face, thus producing a catalog of faces for all the people who appeared within a camera field of view (approaching the camera.)

– Event integration: This capability allows the integration of events from the analysis of other sensors (like automatic door sensors, HVAC sensors, audio) with event streams from other IT systems (like point-of- sale, telephone call logs). Once integrated, the event information can be cross-correlated to video-based events like behavior analysis, LPR and face detection.

Figure 4. SSA Software Architecture

SSA has the following core components:

1. Smart Surveillance Engine (SSE): The Smart Surveillance Engine (SSE) is a C++ framework for capturing events that are observed by sensors such as cameras. Every physical camera in your environment is assigned to an analytic engine running on an SSE server. One SSE Server can handle multiple cameras. In general, SSE is designed to process streams of video in real-time, automatically extracting event (activity in the camera’s field of view) metadata and evaluating user-defined alerts. The specific user functionality associated with each camera is based on the profile which is configured for use by the analytic engine associated with the camera. The following profile types are available:

• Behavior analysis (Outdoor Far-field, Outdoor Near-field, Indoor Tracking)
• Face detection (Face Tracking, Sensitive Face Tracking)
• License plate analysis (via integrated IBM Business Partner technology)

The information extracted by SSE from the camera’s field of view is used to classify objects according to the profile type, providing metadata on object type, object size, object speed, etc.

SSE alerts are conditions which have been specified by the user as being of interest. SSE supports both basic video alerts and compound metadata-based alerts. Currently, we support the following basic video alerts:
• Motion detection-detects motion within a specified region of view
• Tripwire-detects directional crossing of user-defined tripwire
• Region-detects certain specified behavior within a specified zone, such as entering, leaving, starting and stopping
• Abandoned object-detects when an object has been left behind
• Object removal-detects when an object has been taken away
• Directional movement-detects when objects are moving in a user-specified direction
• Camera move/blind-detects changes in camera state such as movement or obstruction
• Camera movement stop-detects when a pan-tilt-zoom (PTZ) camera stops moving


2. Middleware for Large Scale Surveillance (MILS): Each installation of the IBM Smart Surveillance Solution, which includes SSA, has a MILS Server. MILS is a J2EE framework application built around IBM’s DB2®, WebSphere® application server and MQ platforms. In addition to metadata management, MILS provides system management, user management and various extensibility services, including a web services application programming interface (API).

MILS can help provide consolidated backend data management capabilities and store metadata that describes key activities discovered while ingesting video data. It can also create and manage a full index of the ingested video data. This index has a full set of event attributes that can be searched to support forensic analysis. The index attributes can also be used to define composite metadata-based alerts by combining the metadata in various ways to define complex behavioral patterns.

MILS operates on top of a software middleware stack, either IBM Web- Sphere Remote Server (WRS) or IBM Central Site Server. Both provide a middleware platform with a J2EE application server called WebSphere Application Server Network Deployment, integrated with:
– WebSphere MQ for an assured message delivery component
– DB2 Workgroup Server Edition as a relational database management system

3. Applications: These are mainly web applications (HTML, Java, JSP, applets, Javascript) which use the web services enabled by MILS to provide the functionality needed by the user.
 
IBM Smart Surveillance Analytics can also allow administrators to add new metadata schemas to the system, thus enabling new analytic engines to send sensor/event metadata. The metadata from all analytic engines can be consolidated allowing users to search across modalities. These advanced indexing capabilities offer a unique and powerful differentiator from virtually all other available surveillance solutions.

Return on Investment (ROI) by Industry

Implementing IBM Smart Surveillance Solution, which includes Smart Surveillance Analytics, offers many benefits, including the potential to increase return on investment (ROI). ROI successes fit into three cate- gories: managing risk, growing the bottom line and growing the top line. ROI highlights in various industries include the following scenarios:

1. Retail

In today’s retail environment, product shrink dramatically affects the top and bottom line. Globally, on average, 1% to 3% of all retail sales are affected by product shrink, due to conditions including crime, employee fraud, and damaged goods.2 This results in a significant impact on retail margins, especially for those businesses running on a 1% to 3% margin. IBM Smart Surveillance Solution can serve as a loss prevention tool as well as a source of retail intelligence data. It can provide video technology to help manage profit and loss at the cash registers, under the cash registers and throughout the store. Retailers can implement SSS to determine promotion effectiveness, cashier monitoring and people counting. Grocers can use the technology to help reduce Bottom of Basket (BOB) losses. One grocer has reduced BOB by more than 80%, integrating IBM’s optical recognition and an IBM Business Partner Point-of-Sale (POS) system.3


all for profit.. but what do you expect when you find this, searching for the next xbox


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA will increase the ability for child sex slave rings to track their prey and to track those that attempt to protect their loved ones. Right now, the following technology is illegal (but still being implemented) that is why they need CISPA so badly because all their New World Order electronic slave collars are illegal  and they want you to think it is legal because 400 guys said so. Complete Bullshit.

If You Have a Smart Phone, Anyone Can Now Track Your Every Move
Navizon I.T.S. makes it easy to pinpoint Wi-Fi devices anywhere its listening nodes are installed.

http://www.technologyreview.com/blog/mimssbits/27784/
Christopher Mims 04/20/2012


Location services company Navizon has a new system, called Navizon I.T.S., that could allow tracking of visitors in malls, museums, offices, factories, secured areas and just about any other indoor space. It could be used to examine patterns of foot traffic in retail spaces, assure that a museum is empty of visitors at closing time, or even to pinpoint the location of any individual registered with the system. But let's set all that aside for a minute while we freak out about the privacy implications.

Most of us leave Wi-Fi on by default, in part because our phones chastise us when we don't. (Triangulation by Wi-Fi hotspots is important for making location services more accurate.) But you probably didn't realize that, using proprietary new "nodes" from Navizon, any device with an active Wi-Fi radio can be seen by a system like Navizon's.

To demonstrate the technology, here's Navizon CEO and founder Cyril Houri hunting for one of his colleagues at a trade show using a kind of first person shooter-esque radar.
 

And here's a website set up by Navizon to anonymously log the devices of pedestrians who walk by its offices in Miami Beach, FL.
Real-time data (and webcam) from Navizon's listening station at its offices


Finally, here's a promo video that lays out the workings of the technology fairly succinctly, starting at 1:40.
 

It's important to note that the technology is inherently (somewhat) anonymous. Navizon's system can determine where you are, but not necessarily who you are, since all it sees is a Wi-Fi radio.

However, because each device has a unique signature, Navizon's system does know whether you've been in a place before. This could be used for security -- is someone showing up in the same place over and over again, possibly casing the joint? -- or by a retailer who wants to track repeat customers.

In addition, Navizon also has the ability to assign real identifying information to a device, but it's a process that could hardly occur without your knowledge. Here's Houri again, demonstrating the capability.
 

This might be useful in, for example, a hospital that wants to know where a given medical staffer is at any given moment.

Navizon I.T.S. isn't just useful for the owner of the system -- using custom floor layouts or the indoor portions of Google Maps, it can help people precisely locate themselves within buildings, much like the Bluetooth beacon system proposed for use in concert with Broadcom's new GPS chip.


Navizon's technology is also reminiscent of the location data provided to retailers and marketers by Skyhook's Spotrank system, which has a different set of pros and cons: That data is available for every point on the planet, but it only includes devices running Skyhook software.

The rollout of this technology means there are now at least three ways that users can track their locations indoors, where GPS is generally useless -- bluetooth beacon, Spotrank (and proprietary vendor) databases of Wi-Fi hotspots, and Navizon's I.T.S. nodes. It also marks the second way (that I know of) for you to be tracked via the location of your phone, whether you want to be or not. (The first requires access to your cell phone carrier, and is used for example to locate your position when you make a 911 call.)

It shouldn't be surprising that carrying around a little RF transmitter in your pocket makes you visible to all sorts of tracking technology. Maybe it's simply the (inevitable) commercialization of this fact that is somehow unnerving.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA will increase the ability for child sex slave rings to track their prey and to track those that attempt to protect their loved ones. Right now, the following technology is illegal (but still being implemented) that is why they need CISPA so badly because all their New World Order electronic slave collars are illegal  and they want you to think it is legal because 400 guys said so. Complete Bullshit.


Just think what the UN will do with the billions of terabytes of data on all of us...



The United Nations always hires only the most respectable of society!
~~~~~~~~~~~~~~~~~~~~~





UN "peacekeepers" torture a Somali child over fire

Beasts in Blue Berets
http://whatreallyhappened.com/RANCHO/POLITICS/UN/peace.html
by William Norman Grigg

"We are not going to achieve a new world order without paying for it in blood as well as in words and money," warned Arthur Schlesinger Jr. in the July/August 1995 issue of Foreign Affairs.

Schlesinger had taken to the pages of the flagship journal of the Council on Foreign Relations to vindicate the dubious proposition that the United Nations military represents the thin blue line dividing peaceful civilization from savagery — in short, our planetary police. But what happens when the planetary police run amok and become the agents of bloodshed? When local police abuse their power, the abused have avenues of redress. From what body can those abused by the planetary police seek justice? The escalating scandal of unpunished atrocities committed by UN "peacekeepers" illustrates that the planetary police are beyond accountability.

"Perhaps our leaders should put the question to the people: what do we want the United Nations to be?" Schlesinger wrote. "Do we want it to avert more killing fields around the planet? Or do we want it to dwindle into impotence, leaving the world to the anarchy of nation-states?" Critics of the UN should eagerly embrace such a debate — provided that a copy of the above photograph is made available to all participants. First published in the United States on the cover of the June 24th issue of the left-wing weekly Village Voice, the photograph depicts two Belgian paladins of the new world order giddily holding a Somali child over an open flame. Other series of photographs depict UN soldiers kicking and stabbing a Somali, and another soldier apparently urinating on the Somali’s dead body; yet another shows a Somali child being forced to drink salt water, vomit, and worms. A second group of photos published in the July 15th Village Voice shows the dead bodies of bound Somalis — what appears to be the work of a death squad.

One atrocity not caught on camera involved the "punishment" of a Somali child by placing him in a metal container and withholding water from him for two days; predictably, the relentless African heat killed the child. One Belgian UN soldier testified that it was a regular practice to use metal boxes as prison cells, and that other Somalis probably died similarly gruesome deaths.


Strangely Silent

One might expect the photographs and first-person accounts of such atrocities to arouse public indignation against the UN’s "planetary police," just as the endlessly replayed videotape of the Rodney King arrest turned public opinion against the Los Angeles Police Department. Perhaps this is why the photographs have been all but invisible in the United States, and precious little media attention has been devoted to an examination of UN atrocities.

Village Voice reporter Jennifer Gould came across the accounts of the Belgian atrocities while doing an earlier story about sexual harassment of female employees at UN headquarters. "When I spoke with people at the UN, time after time I was told, ‘If you think it’s bad here, you ought to see what happens in peacekeeping operations,’" Gould told The New American. "I started looking into that issue and found that the abuses I reported were well-known and easily documented. They were all over the media abroad, and I was really surprised it hadn’t been written about over here."

Belgian military authorities launched an investigation into the atrocities following publication of a front-page story by Belgium’s Het Laatste Nieuws. In early July, Privates Claude Baert and Kurt Coelus, the two paratroopers photographed dangling the Somali child over a flame, were acquitted by a military court, which ruled that the incident — described by Baert and Coelus as a punishment for stealing — was "a form of playing without violence," according to prosecutor Luc Walleyn. And what of discipline from the UN, whose "Code of Personal Conduct for Blue Helmets" requires that peacekeepers "respect and regard the human rights of all"? Gould reports that a UN spokesman dismissed the acquittal of Baert and Coelus by insisting that "the UN is not in the habit of embarrassing governments that contribute peacekeeping troops."

For its diligence in reporting unwelcome news, Het Laatste Nieuws was rewarded with a bomb threat. Reporter Lieve Van Bastelaere informed The New American that the man arrested for making the threat owned a local bar that is frequented by many people in the military, including veterans of "peacekeeping" missions. "He apparently had been angered by what he had read," Bastelaere observed dryly. "We’ve enhanced our security here at the paper, and the police took the threat seriously, even though he may have been drunk when he made it. He claimed not to remember phoning in the threat when he was arrested."

In September, another military tribunal will be held to investigate the actions of Sergeant Dirk Nassel, the soldier photographed forcing a Somali boy to ingest worms and vomit. However, the Belgian military system — which is deeply entwined with the UN "peacekeeping" apparatus — has yet to inflict substantive penalties for abuses committed in the service of the UN. Several years ago, according to Gould, "Belgian soldiers were also accused of holding mock executions for Somali children and forcing them to dig their own graves; though their officer was given a suspended sentence, the soldiers were acquitted." It is thus firmly established in Belgian military jurisprudence that service in the new world army is a license to commit barbarities with impunity.

Canadian, Italian Atrocities

Nor was the Belgian component of the UN’s "Operation Restore Hope" uniquely barbarous. Three members of a now-disbanded elite Canadian paratroop regiment were tried and convicted of criminal charges in the beating death of a 16-year-old Somali boy named Shidane Arone; the three "peacekeepers" had been photographed smiling beside the bloody corpse of the boy, whose hands had been bound. The incident prompted the creation of a Canadian government commission to review that nation’s military and its involvement in "peacekeeping" missions; however, the inquiry foundered on the obstructionism of political and military bodies and produced what Canadian critics call an incomplete and inadequate report.

On August 8th, Italian military officials admitted that Italian soldiers assigned to UN duty in Somalia had also tortured and otherwise abused Somali civilians. According to the Washington Post, "Two generals who led the Italian forces to Somalia resigned in June following publication of graphic reports of sexual violence against a Somali woman, electric torture of a young man and allegations that an officer had murdered a young boy." Drugs and prostitutes also were allowed to circulate freely among Italian UN troops.

The Italian government assembled a five-member commission of inquiry, which interviewed 145 people and traveled to Africa to interview Somalis who had been tormented by UN troops or witnessed the bestial acts firsthand. The panel’s 46-page report documented that "the criminal events were not just the result of ‘rotten apples’ that you may find in any structure, but were rather the consequence of a stretched line of command and amused compliance toward such high jinks by some junior officers."

"Shocking as it is, the UN scandal in Somalia is no anomaly," wrote Gould in the Village Voice. "[An analysis] of documents and reports relating to recent UN peacekeeping operations has uncovered incidents ranging from murder and torture to sexual exploitation, harassment of and discrimination against local women and children."

The January 18th New York Times reported that 47 Canadian UN troops who served in Bosnia were accused of "drunkenness, sex, black marketeering and patient abuse at a mental hospital they were guarding." The soldiers had been assigned the "humanitarian" chore of guarding a mental hospital at Bakovici in order to secure it for the staff’s return. "The hospital instead became the setting for heavy drinking; sex between soldiers, nurses and interpreters that violated regulations; black-market sales; and harassment of the patients...."

During the "frenzy of looting" that broke out in Liberia in the spring of 1996, peacekeepers used UN vehicles to make off with pilfered goods, according to the April 12, 1996 issue of USA Today. UN vehicles — and the troops responsible for them — have also been a boon to Balkan drug smugglers. The August 9, 1996 Washington Times reported that "U.S. and Bosnian officials suspect that high-ranking UN officials from Jordan based in the central Bosnian towns of Bugojno and Travnik have routinely provided UN vehicles to help smugglers get contraband past checkpoints. The officers appear to have received money and the services of prostitutes from the smugglers, led by Islamic foreigners who entered Bosnia with U.S. approval to defend the Muslim government."

Significantly, the Bosnian narco-ring apparently received critical support from UN police monitors, who were stationed in the Balkans in order to facilitate the creation of a civilian police force dedicated to upholding "world law." A Pentagon official told the Washington Times that such problems are predictable, given that "the international police task force [in Bosnia] is a compendium of people from diverse countries with different degrees of professionalism and training and different backgrounds in operations and ethics" — a fairly compelling explanation of why UN-style "world law" cannot work.

The UN’s "nation-building" mission in Cambodia — long touted as among the world body’s proudest achievements — added to that unfortunate land’s abundant history of lawlessness. In 1993, 170 residents of Cambodia protested the abusive behavior of blue helmet troops in a letter to Yasushi Akashi, who served as then-Secretary-General Boutros Boutros-Ghali’s representative in Cambodia. Prominent among the complaints was the mistreatment of women, who were treated to abuse and harassment by UN officials "regularly in public restaurants, hotels and bars, banks, markets, and shops."

New York Times correspondent Barbara Crossette, whose primary beat is the UN, elaborated: "The bad behavior [of UN forces in Cambodia] was not limited to abuse of women. There were bar fights, brawls, and shootouts and a proliferation of brothels, stolen vehicles and general drunken boorishness. Geographical origins were no indicator of what to expect. While some Asian and African troops got out of line, it was the soldiers of a Bulgarian battalion who had the worst reputation. They went down in local legend as ‘the Vulgarians.’" Cambodia has descended again into murderous chaos, and Kenneth Roth, executive director of Human Rights Watch, believes that "the mess that Cambodia finds itself in today is in large part a product of the UN’s failure to uphold the rule of law" in the course of its "nation-building" mission.

Nightmare in Rwanda

The same lawlessness infected the UN mission to Rwanda, which suffered a Cambodia-style genocide earlier this decade. Crossette noted that Rwandans accused UN troops "of illicit trading, hit-and-run driving, sexual harassment and criminal abuse of diplomatic immunity they have bestowed on themselves. The disruptive personal behavior of some troops has been a factor in Rwanda’s demand that all peacekeepers be withdrawn from the country...."

Also contributing to that demand is the fact that UN forces in Rwanda actually abetted the worst bloodletting in recent memory — the Rwandan genocide of 1994, in which a half-million Tutsis were annihilated in approximately 100 days. "Many of the mass murderers were employees of the international relief agencies," testified Peter Hammond of Frontline Fellowship in Holocaust in Rwanda. In one incident recounted by Hammond, Belgian UN troops stationed in a heavily fortified compound in Kigali "deceived the [Tutsi] refugees by assembling them for a meal in the dining hall and then [they] evacuated the base while the refugees were eating. Literally two minutes after the Belgians had driven out of their base, the Presidential Guard poured into the buildings annihilating the defenceless Tutsi refugees."

When the Tutsi-organized Rwandan Patriotic Front drove many of the worst Hutu murderers from Rwanda into the Congo (then called Zaire), the UN intervened militarily — on the side of the murderers. One year after the genocide, wrote Peter Beinart in the October 30, 1995 issue of The New Republic, "former [Rwandan] government militias, often armed and sometimes in uniform, control many UN refugee camps, terrorizing civilians and plotting to reinvade." Janet Fleischmann of Human Rights Watch-Africa reported, "The UN clearly took the lead in assisting these refugees who were in uniform and armed … and that helped them establish control over the refugee camps." This development provoked the renowned French humanitarian group Medecins sans Frontieres and several other charitable organizations to withdraw from militia-controlled UN refugee camps.

When the UN "peacekeeping" mission to Rwanda finally furled its blue banner in March 1996, the reaction on the part of Rwandans was one of unalloyed relief. "Hundreds of genocide survivors protesting outside the UN headquarters in Kigali cheered … as the UN flag was lowered to mark the end of the United Nations’ peacekeeping mandate," reported a March 3, 1996 Reuters wire service report. Apparently, Rwandans would rather face the prospect of bloody anarchy than submit to the variety of "peace" administered by UN troops.

Follow the Brothels

The market in prostitution — including child prostitution — thrives wherever blue berets decamp. According to Gould, records of UN peacekeeping missions document that "brothels have sprouted nearby — and in one case allegedly inside — UN compounds. In the latter case, prostitutes were allegedly employed by the UN and were reportedly even shipped on UN planes to fornicate with a UN staff member in hotels paid for by the UN."

Last December a UN study on children in war reported that blue berets had been involved in child prostitution in six of the 12 countries which had been studied. In country after country unfortunate enough to attract the UN’s "humanitarian" intervention, "the arrival of peacekeeping troops has been accompanied with a rapid rise in child prostitution," the document reported. Following the signing of a peace treaty in Mozambique in 1992, for example, "soldiers of the United Nations operation … recruited girls aged 12 to 18 years into prostitution."

However, as Jennifer Gould learned, the mistreatment of women is something of a UN tradition — the world body’s enthusiastic support for radical feminism notwithstanding. In a report published in the May 20th Village Voice, Gould described the plight of Catherine Claxon, a UN employee who filed the first-ever sexual harassment complaint against the UN in 1991. After Claxon filed her complaint, "Someone fired a shot through the glass window of a coffee shop by the United Nations" — just above Claxon’s head. "Another bullet shattered Claxon’s windshield as she drove home from her job at the UN one night on the Long Island Expressway." On three other occasions, Claxon was nearly run off the road — at the same spot where she was nearly killed by the gunshot. According to Gould, "UN women describe a godfather-like institution" — a network of cronyism and corruption. "This is compounded by the fact that in some UN member countries, women are treated as chattel instead of as equals."

Haunting Prophecy

Gould described the UN as "a bizarre universe of intrigue and outrage, where diplomats from 185 countries — stuffed suits simmering with regional, religious, and class-bred hatreds — try to promote world peace." Such is the character of the institution whose masters crave the power to enforce "world law." The essence of that abstraction is captured in the photograph of "peacekeepers" Baert and Coelus playfully swinging a Somali child over a fire: Unaccountable power employed mercilessly against the helpless.

More than seven decades ago, while the U.S. Senate was debating ratification of the League of Nations Covenant, Senator William Borah (R-ID) sought to cool the ardor of the League’s supporters by dousing it with a bracing shower of cold reality. Those who believed that a world army would consist of stainless champions of "world peace" were ignoring the unyielding facts about human nature. A world army, Borah declared, would consist of "the gathered scum of the nations organized into a conglomerate international police force ordered hither and thither by the most heterogeneous and irresponsible body or court that ever confused or confounded the natural instincts and noble passions of a people." Can there be any doubt that the UN has vindicated Borah’s dismal prophecy?

Yet Another UN Child Sex Abuse Scandal
http://iusbvision.wordpress.com/2009/01/21/yet-another-un-child-sex-abuse-scandal/
Posted by iusbvision on January 21, 2009

Today – The latest from the New York Daily News:

A high-ranking human rights worker with ties to the United Nations was nabbed at Kennedy Airport Tuesday with kiddie porn in his suitcase, officials said.

Clarence Dias, 65, president of the International Center for Law in Development, whose offices are located at the UN, had the smut in his carry-on bag as he passed through security on his way to a flight bound for Bangkok, Queens District Attorney Richard Brown said.

Transportation Security Administration officials doing a random bag check around 8:20a.m. allegedly found a DVD whose cover featured an apparently underage nude boy and an adult male in Dias’ handbag, prosecutors said.

The video’s title – “Winner Pub Pattaya” – apparently refers to a beach resort in Thailand, authorities said. There were also other lewd photographs in the bag, authorities said.

This is the latest sex scandal to roil the UN.

The agency came under fire in 2002 for turning a blind eye to wide-scale sexual abuse of West African refugee children by its own aid workers and peacekeepers.

UN workers from nine countries – including Britain and India – were accused of sexually exploiting children in dozens of refugee camps in war-torn Sierra Leone, Guinea and Liberia, the internal report found.

Last Week - U.N. probes peacekeeper sex abuse:
Agency has collected 217 allegations of abuse of girls, women in Congo
The Associated Press
Jan. 14, 2009

GENEVA – A United Nations probe collected 217 allegations of abuse of girls and women by peacekeepers in eastern Congo, from sex with teenagers in the back room of a liquor store to threats of “hacking” victims for cooperating with investigators.

The 2006 investigation found many allegations credible and said evidence suggests “frequent and ongoing” sexual exploitation in the region. But it could only establish proof against one of 75 peacekeepers accused of wrongdoing.

Details of alleged incidents dating back to 2004 are summarized in a “strictly confidential” 17-page document.

It is dated Jan. 30, 2007, and was published Wednesday by whistleblower Web site Wikileaks.org. The report has previously been referred to by human rights organizations and the U.N. itself, but not made public. U.N. officials confirmed its authenticity.

Allegations of sex abuse and other crimes have dogged U.N. peacekeeping missions almost since their inception in 1948; the global body has in recent years adopted a “zero tolerance” approach.

The report cited a number of cases where victims may have been pressured or bribed to keep silent. “One victim informed (investigators) that she had received a message from a peacekeeper that he would ‘hack them’ if he ever saw them again,” the report said.

2005 – Sexual misconduct by U.N. personnel in Burundi, Haiti, Liberia and elsewhere:
Officials Acknowledge ‘Swamp’ of Problems and Pledge Fixes Amid New Allegations in Africa, Haiti

By Colum Lynch
Washington Post
Sunday, March 13, 2005; Page A22

UNITED NATIONS — The United Nations is facing new allegations of sexual misconduct by U.N. personnel in Burundi, Haiti, Liberia and elsewhere, which is complicating the organization’s efforts to contain a sexual abuse scandal that has tarnished its Nobel Prize-winning peacekeepers in Congo.

2004 – 68 cases of alleged rape, prostitution and pedophilia by U.N. peacekeepers:

The 34-page report, which was obtained by The Washington Post accuses U.N. peacekeepers from Morocco, Pakistan and Nepal of seeking to obstruct U.N. efforts to investigate a sexual abuse scandal that has damaged the United Nations’ standing in Congo.

The report documents 68 cases of alleged rape, prostitution and pedophilia by U.N. peacekeepers from Pakistan, Uruguay, Morocco, Tunisia, South Africa and Nepal. U.N. officials say they have uncovered more than 150 allegations of sexual misconduct throughout the country as part of a widening investigation into sexual abuse by U.N. personnel that has plagued the United Nations’ largest peacekeeping mission, U.N. officials said.

Special thanks to Ed Morrissey from Hotair.com for archiving some of this information.

2002 – Child sex abuse by UN workers:

A shocking report jointly issued on February 26th by the UN High Commissioner for Refugees (UNHCR) and Save The Children detailed evidence of widespread sexual exploitation of children at refugee camps in West Africa.

According to the report, aid workers from the UNHCR and a number of different NGOs have been sexually abusing children in camps in Liberia, Guinea, and Sierra Leone, where refugees have fled to escape civil war.

According to Paul Nolan of Save The Children, “what emerged was a problem that was widespread, quite possibly endemic and which also included people who were actually in place to provide those refugee children with the care and protection they were entitled to…. It’s a problem we know has been around for some time. Nolan also admitted that the investigation had uncovered a “fairly widespread culture of exploitation” in which “a whole range of people in a position of authority and trust were abusing these positions. All in return for sexual favors.” Still more despicably, many aid worke rs apparently coerced sexual favors from children by withholding food and relief-agency services unless the children complied with their twisted demands.

1987 – Child porn ring ran from UNICEF offices and computers:

By PAUL LEWIS,
THE NEW YORK TIMES
Published: June 25, 1987

LEAD: The head of the United Nations Children’s Fund in Belgium resigned today after the disclosure of a child pornography case linked to the Belgian branch of the organization.

The head of the United Nations Children’s Fund in Belgium resigned today after the disclosure of a child pornography case linked to the Belgian branch of the organization.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Under CISPA...Dyncorp will get all of the personal records of all of your children and real time access to everything they do online including location, friends, personal habits, patterns of behaviour, etc. Just think of what Dyncorp will do with this 'intelligence':

Again! U.S. contractor Dyncorp tied to child sex trade

Posted: January 13, 2011
2:08 pm Eastern

© 2011 WorldNetDaily

Editor's Note: The following report is excerpted from Joseph Farah's G2 Bulletin, the premium online newsletter published by the founder of WND. Subscriptions are $99 a year or, for monthly trials, just $9.95 per month for credit card users, and provide instant access for the complete reports.

A U.S. defense contractor has been caught – again – in a child sex scandal, this time over bacha bazi – the Afghan cultural tradition of "boy play" – after employees allegedly hired young boys to dress up in women's clothing and dance and potentially to be sold for sex, according to a report from Joseph Farah's G2 Bulletin.

DynCorp, a U.S. government contractor that trains Afghan security police, allegedly hired a 17-year-old boy for entertainment at what DynCorp describes as a "going-away party" in Kunduz Province, even though bacha bazi is against Afghan law.

In the practice of bacha bazi, boys ages 9-17 are dressed up as women to dance for leering Afghan men who then use the boys for sex and make them their property. Sources say that the dancing boys are, in effect, sex slaves owned by Afghan police, diplomats and wealthy drug lords.

"They are dressed in women's clothes, they wear bells, they dance and they are rented and sold to the highest bidder," according to one Afghan. "They are often sodomized by many men in a single night, sometimes resulting in [the] death of the child."

The U.S. State Department has called the Afghan practice of owning "dancing boys" a "culturally sanctioned form of male rape."

Continued...
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Jane Hall Lute, undersecretary of DHS has already been giving the private data of US Citizens to other companies and governments. This proves that CISPA is effectively a bailout for corporations who illegally stole and then sold personal data on all of us. CISPA tries to cover up the treason committed by these companies and now everyone can see it plain as day.

Jane Holl Lute, a confirmed psychotic anti-American degenerate pig who sabotaged tens of thousands of child rape investigations on behalf of the UN and Dyncorp (Watch the movie 'Whistleblower' to understand how this was done) has just given all member states of the EU all US passenger data for all flights, this includes all naked body scans, all health data, all rapes of grandmas and infants and how much they resisted their institututionalized luciferian rape sessions by TSA gestapo, etc.

And all of it was done without congress. Remember that Newt Gingrich created DHS and Newt is a confirmed delusional doomsday cult leader. Jane Lute is also a doomsday cultist who disobeys the constitution as a matter of hourly routine. She is a UN loyalist whose job is to destroy the US, just as Gingrich feels his job is to make sure the constitution dies.

So these doomsday cultists have committed open acts of treason by bipassing our constitutional republic's system of government. Things like this are not covered by the Bilderberg media because they want only anger at congress. The Bilderberg plan is for the American people to blame congress foro everything so that nazi psychotic doomsday cultists like Jane Lute can run wild in the streets with WIlliam Lynn III in his cyber drone swarm control bunker death star and Bill Gates' doomsday seed vault, Ted Turner's reduction of  billion, Prince Philip's reincarnation of a Contagion Virus, etc. The elite globalists are doomsday cultists and all you have to do is watch a C SPAN video of Jane Lute to see what a fricking batshit crazy doomsday cult leader she really is.

Anway, here is the theft of US passenger info by an unconstitutional agency, an anti-American pig, and without the approval of the constitutional congress.

U.S., European Union illegally trade data that is in direct treasonous violation of the US Constitution
http://www.nextgov.com/nextgov/ng_20111214_7542.php?oref=topnews
By Aliya Sternstein 12/14/2011

U.S. and European Union officials on Wednesday signed an anti-terrorism accord that renews a 2007 agreement to exchange fliers' personal data, despite objections from some EU members who say the deal is excessively invasive despite added data protections.

The pact took years to negotiate because of European members' privacy concerns. The data at issue -- passenger name records -- encompasses an array of information that people register with travel agencies and airlines to book flights, including names, itineraries, phone numbers, payment methods and credit card numbers.

The new policy limits the purposes of reviewing the records to detecting, pre-empting and investigating criminal offenses, according to European Union Council officials. They added it contains a "robust data protection regime," including the stipulation that personal information "be masked out" -- rendered illegible to most users, after six months. After five years, passenger records will be relocated to a "dormant database" with additional controls. The information, however, will remain accessible to authorities for 15 years for investigations into terrorist activity and 10 years for international crime probes.

The countries will use a technological fix to ensure records cannot be used for anything other than potential terrorist cases after 10 years, DHS officials said. Two databases, one accessible for any future criminal cases and one for possible terrorist probes, will house the same data. The information stored in the designated crime database will be deleted after 10 years, and the duplicate information in the second database will remain open only to terrorist investigators for another five years.

Beyond enhancing privacy, the plan should help authorities identify illicit activity faster, Homeland Security officials added. Today, records shared are sometimes outdated and only dispatched 72 hours before fliers' departure. Going forward, data will be updated in real-time, starting 96 hours before takeoff.

The accord now awaits approval from the European Parliament.

Homeland Security Deputy Secretary Jane Holl Lute said in a statement, "today's signing of the new agreement on the transfer of passenger name records is a significant step forward in strengthening our cooperation with the EU to combat terrorism and transnational threats while respecting our commitment to privacy and data protection. This agreement passed the Council of the European Union with strong support and we encourage the European Parliament to give its consent as soon as possible so that the agreement can enter into force."

Germany and Austria rejected the measure, because of the length of time records will be available, but were unable to block passage Tuesday, Germany's Deutsche Welle reported.

The European Data Protection Supervisor, the EU's independent privacy watchdog, said concerns remain over data retention periods, access by U.S. authorities outside the Homeland Security Department and other uses of the information. Specifically, supervisor Peter Hustinx said records should be deleted immediately after analysis or six months after receipt -- maximum. The reasons for reviewing data should be restricted to terrorism probes or a defined list of serious crimes, he added. And Homeland Security should be prohibited from sharing the information with other U.S. officials or other countries unless those entities guarantee equal levels of protection, Hustinx said.

"Any legitimate agreement providing for the massive transfer of passengers' personal data to third countries must fulfill strict conditions," he said in a statement. "Unfortunately, many concerns expressed by the EDPS and the national data protection authorities of the member states have not been met."

In December 2010, DHS officials told lawmakers that the EU's reluctance to adopt this agreement was one of the legal and cultural factors beyond America's control that was hurting aviation security. U.S. officials were acting in response to several near misses, such as the attempted bombing of a Detroit-bound plane by a man hiding explosives in his underwear.

"The PNR is extremely important," DHS Assistant Secretary of Policy David Heyman said at the time. "It has helped us to do analysis that allows us to find co-travelers who might be of concern -- we did that in the case of Zazi -- and to identify individuals who may be trying to flee the country as the case was with Shahzad." Najibullah Zazi was convicted of trying to ignite explosives in the New York subway system and Faisal Shahzad allegedly attempted to bomb Times Square.

This data first off is illegal to aquire. It is aquired by an agency that is unconstitutional. The data is illegal to hold onto and illegal to store.

This is millions of pieces of data collected every day on people who are not suspects of any crime and who definitely never had a judge sign a search warrant for.

It is 100% illegal and an act of treason against the 4th amendment to the US constitution
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
CISPA Corporate Sponsors' history of provoking and monitoring sexual behaviour in Children


VIACOM, DISNEY, Nickelodeon: providing soft porn Web Games for Kids
Nickelodeon Promoting 'Naughty' Games to Kids!?
http://cwnewz.com/content/view/1337/2/
Written by Leah Jones    
Wednesday, 16 June 2010



Christian Web News - The children's network Nickelodeon is now promoting a selection of naughty games that allow players to look up teachers' skirts and perform a variety of sexual acts – prominently linking to the sexy games from its popular websites for young kids, reports WorldNetDaily.

Nickelodeon links to AddictingGames.com from its websites for children, including Neopets.com and Nick.com. AddictingGames, a website owned by Nickelodeon parent company Viacom, features the Nickelodeon logo and has approximately 34 million monthly users.

The NewsBusters blog noted that the Nickelodeon website features racy games such as "Naughty Babysitter," "Booty Rider" and "You da Sperm!"

"You da Sperm" was set to inactive at the time of this report. Several other games, including "Asstroys," "Vanessa Naughty Toys," "Magic Fingers," "Perry the Sneak" and "Naughty Starlets" have been removed.

However, one game that remains active on the website allows players to glimpse under a teacher's skirt and inside her blouse.

The game, called "Naughty Classroom," begins with three young boys sitting at the front of a classroom and admiring a photo of their female teacher.

"Remember that hot schoolteacher you had a crush on in high school?" the game asks. "The subject of your adolescent dreams, the only teacher who could get your undivided attention in class? Presenting our mouthwatering version of the ultimate teacher-goddess! Here's your chance to fulfill your ultimate childhood fantasy! Naughty Classroom will leave you begging for more homework!"

A teacher walks into the classroom wearing a miniskirt and spike heels. At one point, she unbuttons her shirt and flashes her undergarments at her students. Players can prompt one of the male students to turn on a fan, and a gush of air lifts the teacher's skirt.

Another game, "Naughty Gym Teacher," asks, "Why should boys have all the fun? The giggly schoolgirls cannot get enough of their hot male gym instructor, and they will resort to the naughtiest tricks to get what they want."

"I would love to be Coach Rodder's 'dumb belle,'" one girl says.

"Naughty Babysitter" allows a boy character to shoot ice cubes down his babysitter's blouse. The babysitter gets physical with her boyfriend on the sofa and even kisses the boy she is babysitting.

"Perry the Perv" depicts a cartoon man ogling large-breasted, scantily clad women in public places.

"Perry the Sneak loves women," the description states. "The only problem is that women don't love Perry. … Help Perry get an eyeful without getting a handful for being the world's best Serial Peeker!"

Other games include "Naughty Detective," "Naughty Airplane," "Naughty Elevator," "Naughty Beach," "Naughty Park," "Naughty Supermarket" and "Naughty Summer Camp."

AddictingGames also features "Stick Dude Killing Arena," where players "train to kill until you die." The game features splatters of blood and offers a suicide option. Likewise, "Dark Cut" and "Dark Cut 2" feature "More macho surgery! No anesthetic. No antiseptics. Just rusty knives, corn whiskey, and lots of blood!"

AddictingGames warns of "mature content" by featuring a very small image of a bomb near game titles.

The Campaign for a Commercial-Free Childhood, a national coalition of health-care professionals, educators, advocacy groups and parents, has spoken out against Nickelodeon's promotion of AddictingGames, noting that thousands of parents have written the company to demand it remove links to AddictingGames from its children's websites. Members of the Campaign for a Commercial-Free Childhood overwhelmingly chose AddictingGames as 2010's winner of the Toys Oppressive And Destructive to Young Children Award, also known as the TOADY, for the worst toy of the year.

"Nickelodeon's cynical disregard of pleas from parents is troubling," said Dr. Diane Levin, professor at Wheelock College and co-author of "So Sexy So Soon." "It seems that keeping children's eyes glued to advertiser-supported screens by providing edgy content is much more important to Nick than honoring parents' trust."

Newsbusters writer Alana Goodman noted, "Nick.com describes itself as 'THE place for kids to play games online!' There will even be an entire show devoted to promoting an AddictingGames.com contest airing on Nickelodeon's TV station on June 19."

"With widespread concern over teachers sexually abusing children, it's bizarre that Nickelodeon would partner with a website that seemingly endorses that type of behavior," Goodman wrote. "Also troubling are the lessons that some of the video games seem to teach children – namely, that it's acceptable to sexually harass women."
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately