TSA illegally rolls out European controlled cybernetic document ID enslavement

Author Topic: TSA illegally rolls out European controlled cybernetic document ID enslavement  (Read 7124 times)

0 Members and 1 Guest are viewing this topic.

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
TSA Testing Electronic Document Checkers At Select Airports

Machines Will Be At Dulles International Airport Near Washington
By Aaron CooperCNN

POSTED: 4:26 pm CDT April 13, 2012
UPDATED: 5:10 pm CDT April 13, 2012

WASHINGTON (CNN) -- The Transportation Security Administration is unveiling new technology this month at several airports aimed at verifying boarding passes and IDs of passengers.

A total of 30 machines from three different companies will be tested at Dulles International Airport near Washington, George Bush Intercontinental Airport in Houston and the San Juan airport in Puerto Rico. Dulles received the first of the machines and began rolling them out Wednesday.

"We feel that this technology is a step up from the current technology we are using today," said Domenic Bianchini, director of TSA's checkpoint technology.

Each company's machine looks different, has different software and uses different algorithms, but for passengers they all operate in a similar way.

Travelers approaching the credential authentication system scan their boarding pass bar code on the front of a large computer-equipped podium.

They then give the boarding pass and their identification to a TSA employee who puts it in a scanner.

Read more: http://www.wdsu.com/travelgetaways/30889905/detail.html#ixzz1s2SB1RNR



“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
TSA Testing Electronic Document Checkers At Select Airports

Machines Will Be At Dulles International Airport Near Washington
By Aaron CooperCNN

POSTED: 4:26 pm CDT April 13, 2012
UPDATED: 5:10 pm CDT April 13, 2012

WASHINGTON (CNN) -- The Transportation Security Administration is unveiling new technology this month at several airports aimed at verifying boarding passes and IDs of passengers.

A total of 30 machines from three different companies will be tested at Dulles International Airport near Washington, George Bush Intercontinental Airport in Houston and the San Juan airport in Puerto Rico. Dulles received the first of the machines and began rolling them out Wednesday.

"We feel that this technology is a step up from the current technology we are using today," said Domenic Bianchini, director of TSA's checkpoint technology.

Each company's machine looks different, has different software and uses different algorithms, but for passengers they all operate in a similar way.

Travelers approaching the credential authentication system scan their boarding pass bar code on the front of a large computer-equipped podium.

They then give the boarding pass and their identification to a TSA employee who puts it in a scanner.

Read more: http://www.wdsu.com/travelgetaways/30889905/detail.html#ixzz1s2SB1RNR
And then it will be at all airports.  After that it will be all public transportation.  After that the technology will be integrated into vehicles, where you'll have to be authenticated to have permission to start your car.  Reminds me of what Alex said once:

"You'll need to thumbscan to leave your home."

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Look like Austria will have control of this Nazi cybernetic system which proves once again that the TSA is an entirely illegal agency whose primary mission continues to be the wholesale destruction of the United States of America and 100% enslavement of all her people.

How much more obvious does it get?

This entire agency is illegal, it is as if we invited Hitler's SS to come to America in 1940 in order to help us beautify our parks. The same exact thing would occur, eventually you and your entire family would be raped on video for 2 weeks, undergo 1,0000 eugenics experiments, and microchipped before you got access to a park. That is the exact direction of TSA just as it would have been for the 1940's Hitler's SS.



UE's S.T.O.R.K. project re-animates Hitler's cybernetic enslavement grid
EU-wide interoperability of electronic identities

http://ec.europa.eu/isa/actions/01-trusted-information-exchange/1-4action_en.htm
ECAS-STORK integration
What is this action about?

STORK (Secure idenTity acrOss boRders linKed) is a project co-funded by the EU that aims to implement EU-wide interoperability of electronic identities (eIDs).

While eID is used in important applications in the areas of eGovernment across the EU, it is also of considerable value for secure access to the European Union’s own information systems which have their own authentication system known as ECAS (European Commission Authentication Service).

The goal of ISA’s ECAS-STORK integration action is to develop a secure and user-friendly solution that will allow users to access EU information systems, using their national eID solutions and procedures to authenticate.

The integration will reduce the number of credentials a user has to rely on. At the same time it will enhance security, since national eID solutions are normally based on credentials that are stronger than just a login name and password. The system will also have to cater for users who are not eligible to use STORK.

It is intended to also make the integrated system available to other European Union institutions and bodies. ECAS will, for example, be used for the European e-Justice Portal, which operates in 22 languages.
What are the objectives?

To enable access to European Union information systems using the user's national eID solution with minimal impact on the information systems themselves.
What are the benefits?Benefit
minimise or eliminate the impact of integration of 250+ ECAS-enabled information systems with STORK;
Beneficiaries
European institutions and agencies
Benefit
increase confidence in user identity;
Beneficiaries
European institutions and agencies
Benefit
simplify development thanks to the use of a common mechanism for all information systems;
Beneficiaries
European institutions and agencies
Benefit
improving and modernising images as authentication using electronic identity cards is "cooler" than with a login name and password;
Beneficiaries
European institutions and agencies
Benefit
increase consistency as same credentials are used to access both national information systems and European Commission information systems;
Beneficiaries
Member States’ public administrations
Benefit
aligning automatically with level of security provided by the Member State itself is particularly important for an information system such as IMI where critical information is exchanged.
Beneficiaries
Member States’ public administrations

What is our approach?

The work undertaken by DG Informatics is split into three packages:
participation in the STORK pilot (proof of concept, moving from pilot to production);
consolidation (project charter);
expansion of the system to other EU institutions and bodies.
Case Study - What’s going on in Europe?

I already had the opportunity to utilise this action’s predecessor – a proof of concept demonstrating eID login to ECAS via STORK. With the current action and the production integration using CIRCABC we experienced a seamless integration of Member States’ eIDs. This provides a user experience similar to using my eID to authenticate with a national eGovernment application. Because of this I am confident that enhancing the service for further applications will lead to secure and convenient access to all EU information system. ECAS-STORK integration has been established rather late in the STORK project but quickly became its biggest pilot in terms of countries which formally joined (15). This enthusiasm shows the high expectations from Member States regarding the action.

Benefits obtained

 ECAS-STORK provides secure, multifactor access to services by using existing Member State eID infrastructures. This is both efficient and convenient as users can employ the eID tokens they already have and are used to. Thus, it leverages the security of ECAS access whilst incurring no additional component costs and users don’t have to adapt to a new unknown authentication technology.

Did you face any challenges regarding interoperability?If yes, how did you address them?

Thanks to both the STORK experience from other pilots and the ECAS preparation, no significant interoperability challenges were experienced.

Have you reused existing software/tools/building blocks? If yes, which ones?

The STORK infrastructure has been reused.

Any recommendations for other Public administrations that would like to implement your measure?

By using STORK common components, linking national eIDs to ECAS has proven to be a straightforward task.

Organisation: E-Government Innovation Center, Graz University of Technology

Country: Austria

Contact: Herbert Leitold
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
FLASHBACK 12/2011...

DHS Lute gave EU (a failing coalition) all US passenger data [100% Treason]

Jane Holl Lute, a confirmed psychotic anti-American degenerate pig who sabotaged tens of thousands of child rape investigations on behalf of the UN and Dyncorp (Watch the movie 'Whistleblower' to understand how this was done) has just given all member states of the EU all US passenger data for all flights, this includes all naked body scans, all health data, all rapes of grandmas and infants and how much they resisted their institututionalized luciferian rape sessions by TSA gestapo, etc.

And all of it was done without congress. Remember that Newt Gingrich created DHS and Newt is a confirmed delusional doomsday cult leader. Jane Lute is also a doomsday cultist who disobeys the constitution as a matter of hourly routine. She is a UN loyalist whose job is to destroy the US, just as Gingrich feels his job is to make sure the constitution dies.

So these doomsday cultists have committed open acts of treason by bipassing our constitutional republic's system of government. Things like this are not covered by the Bilderberg media because they want only anger at congress. The Bilderberg plan is for the American people to blame congress foro everything so that nazi psychotic doomsday cultists like Jane Lute can run wild in the streets with WIlliam Lynn III in his cyber drone swarm control bunker death star and Bill Gates' doomsday seed vault, Ted Turner's reduction of  billion, Prince Philip's reincarnation of a Contagion Virus, etc. The elite globalists are doomsday cultists and all you have to do is watch a C SPAN video of Jane Lute to see what a fricking batshit crazy doomsday cult leader she really is.

Anway, here is the theft of US passenger info by an unconstitutional agency, an anti-American pig, and without the approval of the constitutional congress.

U.S., European Union illegally trade data that is in direct treasonous violation of the US Constitution
http://www.nextgov.com/nextgov/ng_20111214_7542.php?oref=topnews
By Aliya Sternstein 12/14/2011

U.S. and European Union officials on Wednesday signed an anti-terrorism accord that renews a 2007 agreement to exchange fliers' personal data, despite objections from some EU members who say the deal is excessively invasive despite added data protections.

The pact took years to negotiate because of European members' privacy concerns. The data at issue -- passenger name records -- encompasses an array of information that people register with travel agencies and airlines to book flights, including names, itineraries, phone numbers, payment methods and credit card numbers.

The new policy limits the purposes of reviewing the records to detecting, pre-empting and investigating criminal offenses, according to European Union Council officials. They added it contains a "robust data protection regime," including the stipulation that personal information "be masked out" -- rendered illegible to most users, after six months. After five years, passenger records will be relocated to a "dormant database" with additional controls. The information, however, will remain accessible to authorities for 15 years for investigations into terrorist activity and 10 years for international crime probes.

The countries will use a technological fix to ensure records cannot be used for anything other than potential terrorist cases after 10 years, DHS officials said. Two databases, one accessible for any future criminal cases and one for possible terrorist probes, will house the same data. The information stored in the designated crime database will be deleted after 10 years, and the duplicate information in the second database will remain open only to terrorist investigators for another five years.

Beyond enhancing privacy, the plan should help authorities identify illicit activity faster, Homeland Security officials added. Today, records shared are sometimes outdated and only dispatched 72 hours before fliers' departure. Going forward, data will be updated in real-time, starting 96 hours before takeoff.

The accord now awaits approval from the European Parliament.

Homeland Security Deputy Secretary Jane Holl Lute said in a statement, "today's signing of the new agreement on the transfer of passenger name records is a significant step forward in strengthening our cooperation with the EU to combat terrorism and transnational threats while respecting our commitment to privacy and data protection. This agreement passed the Council of the European Union with strong support and we encourage the European Parliament to give its consent as soon as possible so that the agreement can enter into force."

Germany and Austria rejected the measure, because of the length of time records will be available, but were unable to block passage Tuesday, Germany's Deutsche Welle reported.

The European Data Protection Supervisor, the EU's independent privacy watchdog, said concerns remain over data retention periods, access by U.S. authorities outside the Homeland Security Department and other uses of the information. Specifically, supervisor Peter Hustinx said records should be deleted immediately after analysis or six months after receipt -- maximum. The reasons for reviewing data should be restricted to terrorism probes or a defined list of serious crimes, he added. And Homeland Security should be prohibited from sharing the information with other U.S. officials or other countries unless those entities guarantee equal levels of protection, Hustinx said.

"Any legitimate agreement providing for the massive transfer of passengers' personal data to third countries must fulfill strict conditions," he said in a statement. "Unfortunately, many concerns expressed by the EDPS and the national data protection authorities of the member states have not been met."

In December 2010, DHS officials told lawmakers that the EU's reluctance to adopt this agreement was one of the legal and cultural factors beyond America's control that was hurting aviation security. U.S. officials were acting in response to several near misses, such as the attempted bombing of a Detroit-bound plane by a man hiding explosives in his underwear.

"The PNR is extremely important," DHS Assistant Secretary of Policy David Heyman said at the time. "It has helped us to do analysis that allows us to find co-travelers who might be of concern -- we did that in the case of Zazi -- and to identify individuals who may be trying to flee the country as the case was with Shahzad." Najibullah Zazi was convicted of trying to ignite explosives in the New York subway system and Faisal Shahzad allegedly attempted to bomb Times Square.

This data first off is illegal to aquire. It is aquired by an agency that is unconstitutional. The data is illegal to hold onto and illegal to store.

This is millions of pieces of data collected every day on people who are not suspects of any crime and who definitely never had a judge sign a search warrant for.

It is 100% illegal and an act of treason against the 4th amendment to the US constitution
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Kissinger's CSIS pieces of shit are getting in  on the action

Authentication 2.0 - New Opportunities for Online Identification
www.csis.org/files/media/csis/pubs/080115_authentication.pdf
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
"He that would make his own liberty secure must guard even his enemy from oppression: for if he violates this duty, he establishes a precedent that will reach unto himself."
-- Thomas Paine

"Power concedes nothing without a demand. It never did, and it never will. Find out just what people will submit to, and you have found out the exact amount of injustice and wrong which will be imposed upon them; and these will continue until they are resisted with either words or blows, or with both. The limits of tyrants are prescribed by the endurance of those whom they oppress."
-- Frederick Douglass, August 4, 1857

"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety."
-- Benjamin Franklin, Historical Review of Pennsylvania, 1759.

"Experience should teach us to be most on our guard to protect liberty when the government's purposes are beneficient...The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well meaning but without understanding."
-- Supreme Court Justice Louis Brandeis
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately